what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

realnetxss.txt

realnetxss.txt
Posted Jan 8, 2004
Authored by Arman Nayyeri

RealNetworks fails to address a Cross-Site Scripting vulnerability in RealOne Player.

tags | advisory, xss
SHA-256 | e5d41b80670285aa34a485a8ca9bb79cf4d12c03325caa345bc3bd8b0fd6ad3c

realnetxss.txt

Change Mirror Download
RealNetworks fails to address Cross-Site Scripting in RealOne Player
====================================================================
Title: RealNetworks fails to address Cross-Site Scripting in RealOne
Date: Tuesday, January 06, 2004
Software: RealOne Player
Vendor: RealNetworks
Patch: N/A
Author: Arman Nayyeri, arman-n[at]Phreaker[dot]net


Description:
============
The security update August 19 ,2003 fails to address the Cross-Site
scripting vulnerability that has been founded later in .SMI file in
RealOne player.
First time, when I research about SMI files in realone I test javascript:
protocol and I wonder that how this simple vulnerability exists in
realone, but when I search the web I see that this vulnerability has
already been discovered. So I download the latest version of realone
and work on it, and after an hour, I have an exploit that works perfect
in the new realone player.
I replace javascript: with file:javascript: in the SMI file.(heh!)
I don't know how RealNetworks say:
"all security vulnerabilities are taken very seriously by RealNetworks"
I'm waiting for the next patch to come and have some fun!
I don't want to annoy realnetworks but it's funny that their
vulnerabilities will never exploited and used for attacks, because
RealNetworks keep sayin':
"While we have not received reports of anyone actually being attacked
with this exploit"
so,I recommend attack with my exploit (AT YOUR OWN RISK!) to your friend
and say to he/she to report this attack to realnetworks to see what
realnetworks will write!
ok, back to business;
we see that realone easily allow file:javascript: to be executed in
the security zone of last page that you loaded into it, that can be
"My Computer" or "Local Intranet" zone too.


Exploit:
========
I use RealNetworks firstrun.smi as a template for my work and use jelmer's
adodb.stream for executing of exe file! as easy as this!
but there is so much problems for me to make the exploit to work!
because when I use file: before javascript: this things happens:
1.we can't use """ and "<" and ">" because of SMI file TAGs
2.in URL all spaces become %20 and prevent script to be executed correctly
3.in URL all "/"s become "\"s
4.we can't directly use "file:javascript:[JSCODE]" because of last two
problems

so I use "file:javascript:document.write('[JSCODE]')".
and translate all of the above bad characters to "\u[unicode]",
and also our URL that contains jscode must be less that 512(almost) bytes.
I load res: and then "file:javascript:document.write('[adodb.stream code]')".

this is the exploit that I provided (harmless .exe):
http://www.freewebs.com/arman2/arealexploit.htm

and also there is a zip file that contains the SMI file, if you want to
know what code is in .SMI!

and also this exploit will work even if active scripting is disabled!

and sorry for my bad english!


Exploit Tested On
=================
RealOne Player (win32)
Version 2.0
Helix Powered
Build 6.0.11.868

And also work on
RealOne Player (win32)
Version 1.0


Special Thanks
==============
Jelmer said:
"I am pretty sure there are still some *very serious* issues out there
with a few leading apps, like
sun java
winamp
realplayer
and probably icq"
as you can see, realplayer is one of them!
next one, likely winamp!(5.0 with many new capabilities!WOW!)


Do I discover more vulnerabilities?
===================================
[STILL] YOU AIN'T SEEN NOTHING YET!


Disclaimer:
===========
Arman Nayyeri is not responsible for the misuse of the information
provided in this advisory. The opinions expressed are my own and not of
any company. In no event shall the author be liable for any damages
whatsoever arising out of or in connection with the use or spread of this
advisory. Any use of the information is at the user's own risk.

~~~~~~~~~~~~~~
Arman Nayyeri
MCP, MCSA 2000, MCSE 2000
Iran
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close