Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
Re: [Full-disclosure] [WEB SECURITY] Universal XSS with PDF files: highly dangerous
From: Jean-Jacques Halans (halansgmail.com)
Date: Wed Jan 03 2007 - 15:54:44 CST
And it makes a great phishing hole too.
Google for any banking pdf's
and attach your fake banking site to let the user login to read the article.
Send out an email pretending to come from Citibank, about a new
article on Wealth Management, with a link to the real article:
Notice the popup (in firefox) which says: "The page at
On 1/3/07, pdp (architect) <pdp.gnucitizengooglemail.com> wrote:
> I will be very quick and just point to links where you can read about
> this issue.
> apparent reason by using the following template:
> You must understand that the attacker doesn't need to have write
> access to the specified PDF document. In order to get an XSS vector
> working you need to have a PDF file hosted on the target and that's
> all about it. The rest is just a matter of your abilities and desires.
> This finding was originally mentioned by Sven Vetsch, on his blog.
> This is a very good and quite interesting. Good work.
> There is a POC I composed:
> More on the matter can be found here:
> pdp (architect) | petko d. petkov
> The Web Security Mailing List:
> The Web Security Mailing List Archives:
> http://www.webappsec.org/rss/websecurity.rss [RSS Feed]
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/