Guest Kronzy Posted March 20, 2015 Report Share Posted March 20, 2015 (edited) #Type of vuln : Flash Cross Domain Policy#Target : www.*.nokia.com#Author : KRONZY#P.O.C : #References : 1. https://www.owasp.org/index.php/Test_RIA_cross_domain_policy_%28OTG-CONFIG-008%29 2. CWE - CWE-942: Overly Permissive Cross-domain Whitelist (2.8) 3. https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2227Raportata. , low level. Edited March 20, 2015 by Kronzy Quote Link to comment Share on other sites More sharing options...
quadxenon Posted March 20, 2015 Report Share Posted March 20, 2015 Bine ca ti-ai lasat ip-ul in Screenshot, indata te duci dupa Shelo.Si asa e blacklisted pe Spamhaus,barracuda si sorbs. Quote Link to comment Share on other sites More sharing options...
SilenTx0 Posted March 20, 2015 Report Share Posted March 20, 2015 De ce sa se duc? dupa Shelo? Testarea vulnerabilit??ilor in site-urile companiilor care au program de bug bounty este legal?. Quote Link to comment Share on other sites More sharing options...
Active Members 0xStrait Posted March 20, 2015 Active Members Report Share Posted March 20, 2015 (edited) Useless , succes la uploadat un fisier cu o aplicatie flash care sa faca acel request cross-domain care sa preia pagina sursa a pagini de schimbat setarile contului si sa faci alt request cu codul csrf obtinut anterior sa schimbe parola sau ceva.A da e clar daca ai dat link pe owasp sigur e convingator si profi. Edited March 20, 2015 by 0xStrait Quote Link to comment Share on other sites More sharing options...
florin_darck Posted March 20, 2015 Report Share Posted March 20, 2015 Nici crossdomain-ul din main domain nu este foarte safe. <allow-access-from domain="*.nokia.com"/><allow-access-from domain="*.nokia.ie"/><allow-access-from domain="*.nokiausa.com"/><allow-access-from domain="*.nokia.co.za"/><allow-access-from domain="*.nokia.fr"/><allow-access-from domain="*.nokia.it"/><allow-access-from domain="*.nokia.de"/><allow-access-from domain="*.nokia.es"/><allow-access-from domain="*.nokia.nl"/><allow-access-from domain="*.nokia.co.in"/><allow-access-from domain="*.nokia.com.sg"/><allow-access-from domain="*.nokia.be"/><allow-access-from domain="*.nokia.ru"/><allow-access-from domain="*.nokia.fi"/><allow-access-from domain="nokia.fusepump.com"/>Deci se poate exploata si asta prin metoda aplicata in oculus de Paulos YIBELO. Facebook’s Oculus – Cross-Site Content Hijacking (XSCH) to Bypass SOP ~ Paulos Yibelo - Offical Blog Quote Link to comment Share on other sites More sharing options...
quadxenon Posted March 20, 2015 Report Share Posted March 20, 2015 De ce sa se duc? dupa Shelo? Testarea vulnerabilit??ilor in site-urile companiilor care au program de bug bounty este legal?.Nu da cu scannere doar in site-uri cu Bb.A dat si in altele Quote Link to comment Share on other sites More sharing options...
Aerosol Posted March 20, 2015 Report Share Posted March 20, 2015 Felicitari @Kronzy sa ne anunti cand ti-au raspuns, cat despre tine quadxenon nu mai fa offtopic in thread-ul omului. ( puteai sa-i dai PM ca si-a uitat IP in poza si aia e. ) Quote Link to comment Share on other sites More sharing options...
Guest Kronzy Posted March 20, 2015 Report Share Posted March 20, 2015 Nu da cu scannere doar in site-uri cu Bb.A dat si in alteleVreau ceva dovezi de la tine ca am folosit scannere , in primu rand nu folosesc asa ceva.2. Folosesc doar Burp Suite pentru ca intruder,request-uri,spider.3. Nu mai fi offtopic , jumatate din post-urile tale sunt offtopic. Quote Link to comment Share on other sites More sharing options...
SilenTx0 Posted March 20, 2015 Report Share Posted March 20, 2015 Nu da cu scannere doar in site-uri cu Bb.A dat si in alteleEh, asta-i altceva. Oricum, scannerele sunt interzise si pe site-urile cu bb. Quote Link to comment Share on other sites More sharing options...
quadxenon Posted March 20, 2015 Report Share Posted March 20, 2015 (edited) Felicitari @Kronzy sa ne anunti cand ti-au raspuns, cat despre tine quadxenon nu mai fa offtopic in thread-ul omului. ( puteai sa-i dai PM ca si-a uitat IP in poza si aia e. )Ok, data viitoare o sa ii dau Pm si o sa ii spun, Kronzy , ai uitat sa iti ascunzi ip-ul in dreapta sus in Screenshotul asta : fixed Edited March 22, 2015 by nedo Quote Link to comment Share on other sites More sharing options...
haked Posted March 20, 2015 Report Share Posted March 20, 2015 Felicitari pustiule nu-i lua in seama pe cei care te critica. Quote Link to comment Share on other sites More sharing options...
dekeeu Posted March 20, 2015 Report Share Posted March 20, 2015 F?-?i un PoC: Random Security: Exploiting Insecure crossdomain.xml to Bypass Same Origin Policy (ActionScript PoC) Quote Link to comment Share on other sites More sharing options...
Guest Kronzy Posted March 21, 2015 Report Share Posted March 21, 2015 (edited) Ok, data viitoare o sa ii dau Pm si o sa ii spun, Kronzy , ai uitat sa iti ascunzi ip-ul in dreapta sus in Screenshotul asta : Cred ca nu era necesar sa pui tu poza iar , din moment ce am blurat ip-ul. Edited March 21, 2015 by Kronzy Quote Link to comment Share on other sites More sharing options...