|
Message-ID: <CAHQ_-nSmiU3vZM-8skFJ0jvuZhjR5eHWX=UOjZM-i1qy47pUwQ@mail.gmail.com> Date: Wed, 19 Apr 2023 07:53:14 -0700 From: Peter Philip Pettersson <philip.pettersson@...il.com> To: oss-security@...ts.openwall.com Subject: Re: Checking existence of firewalled URLs via javascript's script.onload Hi George, There are many ways to make arbitrary HTTP requests through a browser, with and without Javascript. Here's a good writeup from 2018 from the makers of Burp Suite: https://portswigger.net/research/exposing-intranets-with-reliable-browser-based-port-scanning I wouldn't consider this a vulnerability in the browser. Btw, I remember your exploits from the early 2000s - good stuff :) Regards, Philip On Wed, Apr 19, 2023 at 6:31 AM Georgi Guninski <gguninski@...il.com> wrote: > There is minor information disclosure vulnerability similar > to nmap in browser. > > It is possible to check the existence of firewalled URL U via > the following javascript in a browser: > > <script src="U" > onload="alert('Exists')" > onerror="alert('Does not exist')"> > > This might have privacy implication on potentially > "semi-blind CSRF" (XXX does this makes sense?). > > Works for me in Firefox, Chrome and Chromium 112. > > I believe the issue won't be fixed because it will break > stuff in the mess called internet. > > For online test: > > https://www.guninski.com/onload2.html > > -- > guninski: https://j.ludost.net/resumegg.pdf >
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.