`

Zend studio location Cross-Domain Scripting Vulnerability

    博客分类:
  • php
阅读更多

Author: www.80vul.com [Email: saiy1986@gmail.com]
Release Date: 2010/7/10
References: http://80vul.com/Zend%20studio/Zend%20studio%20location%20Cross.htm

 

Zend Studio is a commercial, proprietary integrated development environment (IDE) for PHP developed by Zend Technologies, based on the PHP Development Tools (PDT) plugin for the Eclipse platform (the PDT project is led by Zend).

We found a security bug of it in Zend studio [version >6.0], the description of a function of php script does'nt be escaped or htmlencode, so it lead to can be exploited to execute arbitrary HTML and script code what the attacker inject evil codz on function’s description.

 

And this vul is a “Cross-Zone Scripting” vul, so Successful exploitation allows execution of arbitrary code in user’s system.

 

DEMO:

 

<?php

 

/**

* <script>new ActiveXObject("WScript.shell").Run('calc.exe',1,true);</script>");

*/

function a() {

}

 

Then Open the function a()’s description [type a word "a" or move your mouse on it] ,the calc.exe well be run.

Disclosure Timeline:

2010/07/08 - Found this Vulnerability
2010/07/10 - Public Disclosure

 

 

 

分享到:
评论
发表评论

文章已被作者锁定,不允许评论。

相关推荐

Global site tag (gtag.js) - Google Analytics