Advertisement






Google Chrome 31.0 Webkit Auditor Bypass

CVE Category Price Severity
N/A CWE-XX N/A High
Author Risk Exploitation Type Date
Unknown Critical Remote 2013-09-25
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2013090173

Below is a copy:

# Title: Chrome 31.0 Webkit XSS Auditor Bypass
# Product: Google Chrome
# Author: Rafay Baloch @rafaybaloch And PEPE Vila
# Company: Majorsecurity GMBH
# Website: Majorsecurity.com

============
Description
============

Chrome XSS Auditor is a client side XSS filter used by google chrome
to protect against XSS attacks. Chrome XSS filter has already been beaten
ltos of times, so we thought why don't we give a try.

============
Vulnerability
============

There is a certain criteria that needs to be met for this bypass, For this
bypass the server side filter should convert an aprostrophe ' to
dash -, which is a commonly known practice.

================
Proof of concept
================

The following is a challenge setup by a gentle man with a nick "Strong boi":

http://12342.site11.com/level2.php

The expected solution was to use a well known unfixed bug in chrome and
using both parameters a and b to execute the javascript. However, we
noticed a different behavior, when we injected an apostrophe. It was being
converted to - and hence yielding a valid syntax and executing the
javascript.


http://12342.site11.com/level2.php?a=%22%3E%3Cscript%3E'alert(0);%3C/script%3E

Output Source:

First search:<input type="text" name="a"
value="<script>1-alert(0);</script>"/><br>


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum