JavaScript's "Same Origin Policy" (XWT Foundation Security Advisory)
Till Krech
till at snafu.de
Thu Aug 1 02:03:04 BST 2002
On Wednesday 31 July 2002 14:53, Koos Vriezen wrote:
> On Wed, 31 Jul 2002, Vadim Plessky wrote:
> > _________________________________________________________________________
> >_____ Abstract
> >
> > The following exploit constitutes a security flaw in JavaScript's
> > "Same Origin Policy" (SOP) [1]. Please note that this is *not* the
> > IE-specific flaw reported in Februrary [2].
> >
> > The exploit allows an attacker to use any JavaScript-enabled web
> > browser behind a firewall to retrive content from (HTTP GET) and
> > interact with (HTTP <form/> POST) any HTTP server behind the
> > firewall. If the client in use is Microsoft Internet Explorer 5.0+,
> > Mozilla, or Netscape 6.2+, the attacker can also make calls to SOAP or
> > XML-RPC web services deployed behind the firewall.
>
> Is this really a JS flaw, or is there something with the DNS lookup wrong?
> IMHO a DNS server should never respond with a private ip address, after
> forwarding a request to a non-private DNS server.
> Don't know if I can configure bind that way...
I think, the trick is that you download a page from outside the firewall,
which can then, with the locally running javascript, access ressources from
the inner side. Think of a javascript filling a frame with content using
otherframe.document.location.href="http://intranet/internal.html"
and then reading out this frame (innerHTML or so) and send the content back to
the server outside.
The question is: can a javascript from one location (page from evil server)
access the page/script/dom tree which stems from another location (intranet)?
Without this possibility, the above would not work - what it shouldn't.
regards, till
>
> Regards,
>
> Koos Vriezen
--
Till Krech from Berlin, Germany is happy with
SuSE Linux 8.0 (i386) 2.4.18-64GB-SMP * KDE: 3.0.6 (KDE 3.1 alpha1)
Qt: 3.0.6-snapshot-20020712 * gcc version 2.95.3 20010315 (SuSE)
More information about the kfm-devel
mailing list