Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-0072 PoC — Microsoft Internet Explorer 特权提升漏洞

Source
Associated Vulnerability
Title:Microsoft Internet Explorer 特权提升漏洞 (CVE-2015-0072)
Description:Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origin Policy and inject arbitrary web script or HTML via vectors involving an IFRAME element that triggers a redirect, a second IFRAME element that does not trigger a redirect, and an eval of a WindowProxy object, aka "Universal XSS (UXSS)."
Description
Universal xss PoC with multiple target sites (CVE-2015-0072)
Readme
# Universal Cross Site Scripting PoC

This is a PoC for CVE-2015-0072 for sequentialy get the targeted websites cookies.

## Disclaimer

This Proof of Concept is for educational purpose only. Please do not use it against any system without prior permission. You are responsible for yourself for what you do with this code.

## Improvement

In order for the exploit to work, the javascript injection inside the first frame location must occur after the second frame redirect. The first solution, proposed in the other PoC, deployed sleeps and timeouts. However, if the server syncronize the redirect and sleep requestes, one can exploit the vulnerability without sleeps.

Actually there is a little setTimeout, but 500 ms is big improvement from the previous 5000! Note: this code is a PoC, it was never tested outside my test environment.

## Usage

    npm install
    node app.js

For basic logging launch

    node app.js > cookies.txt

## Configuration

In `conf.json`, set `host` to the value of your public host and `targets` to
the sites to retrieve the cookies.

Note that targets must not set the HTTP header `x-frame-options`.

## References

* [Original PoC](http://www.deusen.co.uk/items/insider3show.3362009741042107/)
* [Evolved PoC](http://packetstormsecurity.com/files/130308/Microsoft-Internet-Explorer-Universal-XSS-Proof-Of-Concept.html)
* [Defence analysis](http://sijmen.ruwhof.net/weblog/427-mitigations-against-critical-universal-cross-site-scripting-vulnerability-in-fully-patched-internet-explorer-10-and-11)
File Snapshot

[4.0K] /data/pocs/d187164264a24ff28522ae33e651adf62d044369 ├── [3.8K] app.js ├── [ 213] conf.json ├── [1.0K] LICENSE.txt ├── [ 412] package.json └── [1.5K] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →