michel1980 / domsnitch

Automatically exported from code.google.com/p/domsnitch
Apache License 2.0
0 stars 0 forks source link

False Negative in innerHTML example #21

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago
What steps will reproduce the problem?
1. Load URL http://cloudscan.org
2. Script Code from document.location executes via DOM manipulation by 
innerHTML property in https://a12.alpha.godaddy.com
3. Can also use DOMinator from OWASP to see same, Acunetix etc..

What is the expected output? What do you see instead?
Expected to fingerprint DOM-XSS in document.location path part at innerHTML and 
also vuln are location.ToString and referrer.

What version of the product are you using? On what operating system?
I am using Windows 2008 R2 Server 64bit with Chrome 12.0.742.122 and 
the download for DOMSnitch.. great tool!

This is a False Negative report on the assumption that is should be 
fingerprinting on innerHTML.. but perhaps I am reading your spec wrong.

Sorry of this is noise...

Original issue reported on code.google.com by h02...@gmail.com on 22 Jul 2011 at 2:44

GoogleCodeExporter commented 8 years ago
This issue seems similar to Issue 18. There is already an action item to 
address this.

Original comment by r...@r-n-d.org on 23 Jul 2011 at 1:47

GoogleCodeExporter commented 8 years ago
Hi! Great tool you've released and thank you for the response in #18, great 
info for those learning.

Original comment by h02...@gmail.com on 23 Jul 2011 at 2:08

GoogleCodeExporter commented 8 years ago
Marking this as duplicate of Issue 18. Please follow/comment the issue there.

Original comment by r...@r-n-d.org on 1 Sep 2011 at 8:23

GoogleCodeExporter commented 8 years ago
Re-opening as separate bug to track.

Original comment by r...@r-n-d.org on 1 Sep 2011 at 4:28

GoogleCodeExporter commented 8 years ago
Hi!

Thanks for reopening ticket!

Global URL = http://cloudscan.org
Offending JS = https://a12.alphagodaddy.com/hosting_ads/gd01.js

Issues by UA | Chrome DOMSnitch Report
==========================================
Loading of CSS from an untrusted origin
Loading of scripts from an untrusted origin

Issues by UA | DOMinator Report
==========================================
Sources of Tainted Input: location.toString | referer

Acunetix Web Vulnerability Scanner, August 2011 Build
==========================================
JS executes from document.location path part via innerHTML in 
https://a12.alphagodaddy.com/hosting_ads/gd01.js at line 26,28.

Suggestion: Consider sighting the sources and sinks.. line numbers of offensive 
code, and a complete stack trace for repro.. a la Acunetix or DOMinator

Question: Different results all around.. I'm asking if you can run thru the 
Global.URL yourself and compare and contrast the output of DOMinator vs. 
DOMSnitch vs. Acunetix.

Post your own results, and I'll do the same.. I think it will be a great 
learning example for all, immho...

-D

Original comment by h02...@gmail.com on 1 Sep 2011 at 5:41

GoogleCodeExporter commented 8 years ago
Hi!

Adding.. no output from stack trace in exported TXT File.. no trace in output...

-D

Original comment by h02...@gmail.com on 6 Sep 2011 at 1:04

GoogleCodeExporter commented 8 years ago
Hi!

w/r/t reporting, suggest that .. Mixed content through the HREF attribute of a 
LINK element ... be part of a weak programming skills / DORK Report .. 

w/r/t reporting, suggest that .. Loading of scripts from an untrusted origin. 
.. be part of a weak programming skills / DORK Report.. 

w/r/t parsing, when Referrer Data found with innerHTML, when matching on www, 
my and other vhost name..   injection of fqdn.vhost.tld results are FP .. 
(provided for those following the thread).. example ..  referrer data set to 
www.xss.cx or my.xss.cx etc.... FP

w/r/t parsing and malformed JSON, suggest that be included in weak programming 
skills / DORK Report.. 

w/r/t Report Format Suggestions.. consider developing a target analysis file, 
including sources, sinks, methods abused etc.... suggest include other output 
from the Scope on Wiki or a pointer URL etc.. often we compare the intended 
scope of DOMinator and DOMSnitch and then compare the results with our own 
analysis and often see a wide disparity in results... having the sources, 
sinks, methods abused etc.. with the stack trace can often help reducing FP, FN 
etc..  

I'll post a few comps in another comment using the webkit XSSAdmin scripts as 
example.

-D

Original comment by h02...@gmail.com on 6 Sep 2011 at 1:30