Guest Kronzy Posted March 20, 2015 Report Posted March 20, 2015 (edited) #Type of vuln : Flash Cross Domain Policy#Target : www.*.nokia.com#Author : KRONZY#P.O.C : #References : 1. https://www.owasp.org/index.php/Test_RIA_cross_domain_policy_%28OTG-CONFIG-008%29 2. CWE - CWE-942: Overly Permissive Cross-domain Whitelist (2.8) 3. https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2227Raportata. , low level. Edited March 20, 2015 by Kronzy Quote
quadxenon Posted March 20, 2015 Report Posted March 20, 2015 Bine ca ti-ai lasat ip-ul in Screenshot, indata te duci dupa Shelo.Si asa e blacklisted pe Spamhaus,barracuda si sorbs. Quote
SilenTx0 Posted March 20, 2015 Report Posted March 20, 2015 De ce sa se duc? dupa Shelo? Testarea vulnerabilit??ilor in site-urile companiilor care au program de bug bounty este legal?. Quote
Active Members 0xStrait Posted March 20, 2015 Active Members Report Posted March 20, 2015 (edited) Useless , succes la uploadat un fisier cu o aplicatie flash care sa faca acel request cross-domain care sa preia pagina sursa a pagini de schimbat setarile contului si sa faci alt request cu codul csrf obtinut anterior sa schimbe parola sau ceva.A da e clar daca ai dat link pe owasp sigur e convingator si profi. Edited March 20, 2015 by 0xStrait Quote
florin_darck Posted March 20, 2015 Report Posted March 20, 2015 Nici crossdomain-ul din main domain nu este foarte safe. <allow-access-from domain="*.nokia.com"/><allow-access-from domain="*.nokia.ie"/><allow-access-from domain="*.nokiausa.com"/><allow-access-from domain="*.nokia.co.za"/><allow-access-from domain="*.nokia.fr"/><allow-access-from domain="*.nokia.it"/><allow-access-from domain="*.nokia.de"/><allow-access-from domain="*.nokia.es"/><allow-access-from domain="*.nokia.nl"/><allow-access-from domain="*.nokia.co.in"/><allow-access-from domain="*.nokia.com.sg"/><allow-access-from domain="*.nokia.be"/><allow-access-from domain="*.nokia.ru"/><allow-access-from domain="*.nokia.fi"/><allow-access-from domain="nokia.fusepump.com"/>Deci se poate exploata si asta prin metoda aplicata in oculus de Paulos YIBELO. Facebook’s Oculus – Cross-Site Content Hijacking (XSCH) to Bypass SOP ~ Paulos Yibelo - Offical Blog Quote
quadxenon Posted March 20, 2015 Report Posted March 20, 2015 De ce sa se duc? dupa Shelo? Testarea vulnerabilit??ilor in site-urile companiilor care au program de bug bounty este legal?.Nu da cu scannere doar in site-uri cu Bb.A dat si in altele Quote
Aerosol Posted March 20, 2015 Report Posted March 20, 2015 Felicitari @Kronzy sa ne anunti cand ti-au raspuns, cat despre tine quadxenon nu mai fa offtopic in thread-ul omului. ( puteai sa-i dai PM ca si-a uitat IP in poza si aia e. ) Quote
Guest Kronzy Posted March 20, 2015 Report Posted March 20, 2015 Nu da cu scannere doar in site-uri cu Bb.A dat si in alteleVreau ceva dovezi de la tine ca am folosit scannere , in primu rand nu folosesc asa ceva.2. Folosesc doar Burp Suite pentru ca intruder,request-uri,spider.3. Nu mai fi offtopic , jumatate din post-urile tale sunt offtopic. Quote
SilenTx0 Posted March 20, 2015 Report Posted March 20, 2015 Nu da cu scannere doar in site-uri cu Bb.A dat si in alteleEh, asta-i altceva. Oricum, scannerele sunt interzise si pe site-urile cu bb. Quote
quadxenon Posted March 20, 2015 Report Posted March 20, 2015 (edited) Felicitari @Kronzy sa ne anunti cand ti-au raspuns, cat despre tine quadxenon nu mai fa offtopic in thread-ul omului. ( puteai sa-i dai PM ca si-a uitat IP in poza si aia e. )Ok, data viitoare o sa ii dau Pm si o sa ii spun, Kronzy , ai uitat sa iti ascunzi ip-ul in dreapta sus in Screenshotul asta : fixed Edited March 22, 2015 by nedo Quote
haked Posted March 20, 2015 Report Posted March 20, 2015 Felicitari pustiule nu-i lua in seama pe cei care te critica. Quote
dekeeu Posted March 20, 2015 Report Posted March 20, 2015 F?-?i un PoC: Random Security: Exploiting Insecure crossdomain.xml to Bypass Same Origin Policy (ActionScript PoC) Quote
Guest Kronzy Posted March 21, 2015 Report Posted March 21, 2015 (edited) Ok, data viitoare o sa ii dau Pm si o sa ii spun, Kronzy , ai uitat sa iti ascunzi ip-ul in dreapta sus in Screenshotul asta : Cred ca nu era necesar sa pui tu poza iar , din moment ce am blurat ip-ul. Edited March 21, 2015 by Kronzy Quote