The Dangers of Cross-Site-Scripting: Rogers Hi-Speed Internet Network [Canada]
Wednesday, May 26, 2004
Many people dismiss the dangers of cross site scripting as
nothing more than 'parlor tricks'. This is not a good idea. As
previously indicated:
[see: http://www.securityfocus.com/archive/1/348363]
when the right circumstance arises, this puny 'parlor trick' can
prove quite devastating. The following practical example
demonstrates this:
The Rogers Hi-Speed Internet Network of Canada
[http://www.rogers.com/] via cable modem appears to have a
fairly long history in the industry and some impressive numbers
if they can be deciphered:
"Rogers Cable passes 3.2 million homes in Ontario, New Brunswick
and Newfoundland, with 70% basic penetration of its homes
passed. Rogers Cable pioneered high-speed Internet access with
the first commercial launch in North America in 1995 and now
approximately 26%of homes passed are Internet customers"
For whatever odd reason it maintains a so-called "Hi-Speed"
content portal conveniently located in the time-tested Internet
Explorer security setting: 'intranet zone':
http://www/custom.jsp
draws the following:
[screen shot: http://www.malware.com/ro-geez.png 10KB]
Traversing the so-called "Hi-Speed" content portal reveals
sufficient content operational in the 'intranet zone' throughout
the majority of the site generalously laden with numerous cross-
site scripting points of entry. Quick checking of the server
[Server: Resin/2.1.9] confirms that these 'parlor trick' errors
are well documented with the indicated apparatus.
Internet:
http://hispeed.rogers.com/custom.jsp
http://hispeed.rogers.com/sports/nfl/team/report.jsp?
t=""><iframe%20src=http://www.microsoft.com/>
Intranet:
http:/www/
http://www/custom.jsp
http://www/sports/mlb/team/report.jsp?l="><script></script>
The 'intranet zone' is a step down from the 'internet zone' and
only one above our old friend the 'local zone':
[screen shot: http://www.malware.com/ro-geez.png 10KB]
Operations in this particular zone include:
- remote access to local files and folders via frames including
local resource files etc
- the old ADODB.Stream initializing with prompt instead of
failing
- many other past injection possibilities as well as any new
ones to be discovered in the future
Hammer this all together and if the aforementioned numbers are
accurate we have a whole lot of networked users ripe for the
plucking.
This is all the result of a poorly constructed website, a poorly
configured network and a ridiculously 'intuitive' thing for a
web browser so tightly woven to the operating system,
so 'clever' as to set up these zone things by itself that simply
viewing a web page will install and run your malware without
you having to do anything.
Notes:
1. Get rid of the browser once and for all
2. Contact to both corp security and generic security as well as
generic abuse and corp abuse at this particular network yields
nothing. A canned bounce to go and fill in some 'web form' on
their riddled-with-holes site.
3. Other fancy 'networks' like this may want to check their
configurations
End Call
--
http://www.malware.com