Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-0072 PoC — Microsoft Internet Explorer 特权提升漏洞

Source
Associated Vulnerability
Title:Microsoft Internet Explorer 特权提升漏洞 (CVE-2015-0072)
Description:Microsoft Internet Explorer(IE)是美国微软(Microsoft)公司开发的一款Web浏览器,是Windows操作系统附带的默认浏览器。 当Microsoft IE 9版本至11版本不正确地强制实施跨域策略时会存在特权提升漏洞.攻击者可通过诱使用户访问受影响网站,利用该漏洞获取访问域中信息并将其插入其他域,并以当前用户的权限执行任意代码。
Description
Universal xss PoC with multiple target sites (CVE-2015-0072)
Readme
# Universal Cross Site Scripting PoC

This is a PoC for CVE-2015-0072 for sequentialy get the targeted websites cookies.

## Disclaimer

This Proof of Concept is for educational purpose only. Please do not use it against any system without prior permission. You are responsible for yourself for what you do with this code.

## Improvement

In order for the exploit to work, the javascript injection inside the first frame location must occur after the second frame redirect. The first solution, proposed in the other PoC, deployed sleeps and timeouts. However, if the server syncronize the redirect and sleep requestes, one can exploit the vulnerability without sleeps.

Actually there is a little setTimeout, but 500 ms is big improvement from the previous 5000! Note: this code is a PoC, it was never tested outside my test environment.

## Usage

    npm install
    node app.js

For basic logging launch

    node app.js > cookies.txt

## Configuration

In `conf.json`, set `host` to the value of your public host and `targets` to
the sites to retrieve the cookies.

Note that targets must not set the HTTP header `x-frame-options`.

## References

* [Original PoC](http://www.deusen.co.uk/items/insider3show.3362009741042107/)
* [Evolved PoC](http://packetstormsecurity.com/files/130308/Microsoft-Internet-Explorer-Universal-XSS-Proof-Of-Concept.html)
* [Defence analysis](http://sijmen.ruwhof.net/weblog/427-mitigations-against-critical-universal-cross-site-scripting-vulnerability-in-fully-patched-internet-explorer-10-and-11)
File Snapshot

[4.0K] /data/pocs/d187164264a24ff28522ae33e651adf62d044369 ├── [3.8K] app.js ├── [ 213] conf.json ├── [1.0K] LICENSE.txt ├── [ 412] package.json └── [1.5K] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.