Hijacking Opera's Native Page using malicious RSS payloads
Page 1 of 1
Hijacking Opera's Native Page using malicious RSS payloads
In this exploit, an attacker uses a maliciously crafted RSS payload to achieve full control over the Victim’s Opera Browser. The attack works by convincing a user to visit a RSS feed link. When the user opens the url in Opera, there are two things that take place. The first one being Javascript in various RSS feed entries gets executed in the context of the calling site. This part was discussed in the previous post and can be used to execute XSS in the context of that site. The second thing that occurs is the untrusted rss feed content lands up in the Opera’s Feed Subscription Page (also the reason for this post). Since this is a native page, it runs in a higher privileged zone than the internet zone (something similar to chrome:// in Firefox and Chrome).
So, if you find a way to execute your malicious javascript in the feed subscription page, you can essentially execute native opera functions and ultimately use it to control the Victim’s Opera browser. It looks like Opera’s Team did think about the implications of putting untrusted user content in this page and hence only permitted a certain whitelist of html tags. In addition, for some html tags such as “A” and “IMG”, it required certain preconditions to be met. See the code snippets captured using Opera inbuilt debugger DragonFly (you can also use Firebug lite).
More info and images check: http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/
So, if you find a way to execute your malicious javascript in the feed subscription page, you can essentially execute native opera functions and ultimately use it to control the Victim’s Opera browser. It looks like Opera’s Team did think about the implications of putting untrusted user content in this page and hence only permitted a certain whitelist of html tags. In addition, for some html tags such as “A” and “IMG”, it required certain preconditions to be met. See the code snippets captured using Opera inbuilt debugger DragonFly (you can also use Firebug lite).
More info and images check: http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/
andry- Moderator
- Posts : 467
Join date : 2010-05-07
Similar topics
» Hijacking Safari 4 Top Sites with Phish Bombs
» Malicious PDF Analysis E-book
» protect yourself from malicious hackers
» Firesheep - Firefox HTTP session hijacking extension
» Cross Site URL Hijacking by using Error Object in Mozilla Firefox.
» Malicious PDF Analysis E-book
» protect yourself from malicious hackers
» Firesheep - Firefox HTTP session hijacking extension
» Cross Site URL Hijacking by using Error Object in Mozilla Firefox.
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
|
|