quasar / Quasar

Remote Administration Tool for Windows
MIT License
8.8k stars 2.49k forks source link

Keylogger Cross-Site Scripting (XSS) vulnerability #167

Closed yankejustin closed 9 years ago

yankejustin commented 9 years ago

Background

Attack Vector (steps for exploitation)

  1. Build client files, initialize the server, and build a client with keylogging enabled.
  2. Initialize the client. On the client machine, type the following: capture2
  3. On the server, get the logs from the client and open the file. Notice the message box popup.

Additional Notes

Does this cause an adverse affect on the accuracy of the keylogger? No. The log file is unaffected; opening the log file in something like Notepad would reveal that it is accurate. However, because the log file is parsed by the WebBrowser control on the FrmKeylogger Form, these tags will be translated literally by the WebBrowser, so the log file will not appear on the Form to be as it is on the actual file. What other inputs will be affected by this issue? All HTML tags. These tags are rendered literally. Try to type >hr /> (Note: Type a < for the beginning of the hr tag).



Figure 1

capture

yankejustin commented 9 years ago

@MaxXor This is also a high priority issue that must be fixed before we merge dev into master... I just felt it deserved to be in its own issue. :hankey:

MaxXor commented 9 years ago

This should be fixed in the latest commit.