PIDynamics WebInspect Cross-Application Scripting (XAS)
SPIDynamics WebInspect is powerful security assessment tool for Web application vulnerable to XAS which could lead to remote code execution.
Successful exploitation allows remote attackers to execute arbitrary script code on the host, where scanner is installed with privileges of user who launch the scanner. Victim should scan site and open report. Typically scanner runs on administrator's or security auditor's box with a lot of interesting data. It possibly runs under high-privileged account. Attacker should create specially crafted site with vulnerability to be displayed in report. "Vulnerable" URL should include script code. Example of such report is a "Hidden Form Value Vulnerability ID: 4727". By default script is executed in Internet Security Zone of IE (not sure). But with little effort attacker can use predictable resource location to bypass restrictions of Internet Zone and execute script in "My Computer" security zone. Example:
Attacker can use social engineering to install full featured application, for example new version of "SPIDynamics Reported ActiveX".
Following asp file can be used to reproduce vulnerability:
<HTML><HEAD><BODY> <% if request.querystring<>"" then response.write request.querystring end if %> <form action="script>/<script>window.open(%27file://C:\\Program Files\\SPIDynamics\\WebInspect\\Working\\vulnerability.htm%27)</script>" method=get> Please login:<br> <input type=submit value="Login"><br> <input type=hidden name='hidden' value="Login"><br> </form> </BODY></HTML>
You should change default error page to iisstart.asp (see screenshot in attach). Scan results can be found in attached files.
V. VENDOR RESPONSE
Initial vendor response received
VII. DISCLOSURE TIMELINE
04/15/2005 Initial vendor notification 04/15/2005 Initial vendor response
Disable Active Scripting in My Computer Zone (http://support.microsoft.com/default.aspx?scid=kb;en;833633)
IX. LEGAL NOTICES
This advisory is being provided to you under the RFPolicy documented at http://www.wiretrip.net/rfp/policy.html. You are encouraged to read this policy; however, in the interim, you have approximately 5 days to respond to this initial email.
Thanks: 3APA3A for spellcheck & malware.com for some ideas.