logo
0 anonymous
Views: 1089147 Challenges: 342
Users: 12689 Online: 10

Page 1 of 2

myspace has dodgy content filters... – 11 Posts

  • myspace has dodgy content filters...

    02/02/2007 09:47
    aceldama's Avatar aceldama 4340
    Not SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot Specified
    ...now i have no idea on whether this has been done before, but a little something i discovered yesterday after the myspace people decided to remove my flash music player. (seems that they have something agains using content from myflashfetish.com which is where my player is hosted) it's nothing spectacular really, just something i'd like to share.<br><br>The Code: as i said, i wanted to use an external player form myflashfetish.com as my music player to host more than one profile song and have a bit more functionality. so i logged on did the bits and got the code to use which was:<br><br>&lt;center&gt;&lt;embed src=\"http://myflashfetish.com/myflashfetish-mp3-player.swf?myid=1394802&amp;f=1\" menu=\"false\" quality=\"best\" scale=\"noscale\" bgcolor=\"#ffffff\" wmode=\"transparent\" width=\"218\" height=\"155\" name=\"MyFlashFetish.com\" align=\"middle\" allowScriptAccess=\"sameDomain\" type=\"application/x-shockwave-flash\" pluginspage=\"http://www.macromedia.com/go/getflashplayer\" /&gt;&lt;/center&gt;<br><br>The Problem: myspace removes all the little things she doesn't like, and the pasted code up like this:<br><br>&lt;center&gt;&lt;embed src=\"http://.../myflashfetish-mp3-player.swf?myid=1394802&amp;f=1\" menu=\"false\" quality=\"best\" scale=\"noscale\" bgcolor=\"#ffffff\" wmode=\"transparent\" width=\"218\" height=\"155\" name=\"...\" align=\"middle\" allowScriptAccess=\"sameDomain\" type=\"application/x-shockwave-flash\" pluginspage=\"http://www.macromedia.com/go/getflashplayer\" /&gt;&lt;/center&gt; <img alt="\&quot;:wall2:\&quot;" src="%5C"><br><br>The solution: Myspace is notorious for it's flaws in the \"sanitation &amp; filtering\" department. first i thought of using the simple method of registering the url at tinyurl.com, thus concealing the flash url completely. but myspace was a step ahead and \"http://tinyurl.com/*\" became \"http://.../*\". yay... <img alt="\&quot;:wall:\&quot;" src="%5C"><br><br>...seems i needed a new option, so i tried a redirect exploit by changing the url to <br>\"http://38.113.219.114/cgi-bin/ucj/c.cgi?url=h%74tp://www.my%66lashfetish.com/myflashfetish-mp3-player.swf%3Fmyid=1394802%26f=1\"<br><br>results! it actually worked! the flash player now loaded with no problems whatsoever. <img alt="\&quot;:drink4:\&quot;" src="%5C"> now i have a flash player until myspace wishes to act on my email.<br><br>
  • 02/02/2007 09:47
    theblacksheep's Avatar theblacksheep 5610
    Not SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot Specified
    Hi,<br><br>that is really cool. I guess quite a lot of people kept searching for a solution to this problem.<br>Does myspace just remove url's that are in a blacklist or why haven't they removed \"38.113.219.114\"?<br>Shouldn't it be replaced by \"...\", too?<br>Maybe some further research would clear things up.<br><br>Nevertheless nice dicovery!<br><br>PS: How did you find the XSS at \"http://38.113.219.114/\" <img alt="\&quot;:devil3:\&quot;" src="%5C">
  • 02/02/2007 09:47
    UnknownUser's Avatar UnknownUser 2,7290
    Not SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot Specified
    i guess a bunch of legitimate websites could just put up a small page to filter content through..<br><br>if i were a myspace user i would probably use one of my other hosts, to host a little file<br>that looks sorta like this<br><pre> &lt;? $whitelist=explode(\",\",\"http:// ...) if($whitelist.contains($_REQUEST[url])) passthru(file($_REQUSET[url])); ?&gt; </pre><br><br>however i have no experience with myspace, or any other social networking ... it makes me shiver<br>further more my php syntax is very rusty but if you are willing to try i'm sure it's clear enough to understand my point<br><br>or perhaps just send out an 302 message with the correct address. (if that's possible cross site)then there is no xss<br><br>sounds to me it's inherently impossible to manage a blacklist at websites like myspace... it should probably whitelist or nothing ..<br><br>ow and btw i learned the hard way that that ip has an NSFW front page<img alt="\&quot;;)\&quot;" src="%5C">
  • 02/02/2007 09:47
    aceldama's Avatar aceldama 4340
    Not SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot Specified
    good one rhican. i guess i should've warned you abut that ip. <img alt="\&quot;LOL\&quot;" src="%5C"> in my defense, that was (at the time) the first site i could find that had a working redirect service. i'm sure there are many SFW ones out there to play with though. but to comment on tbs's theory, yes, they only seem to have a blacklist of cetain words like
  • 02/02/2007 09:47
    UnknownUser's Avatar UnknownUser 2,7290
    Not SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot Specified
    wouldn't be the first time webmasters don't listen ...<br><br><br>like when a friend wanted to buy stuff from melanibooks.gr<br>(and thus would have trusted her creditcard details to the website)<br>which in my opinion justifies adding a few ' to the websites url to <br>see if it's half decent ... <br><br>while there is stuff like <br><br>http://www.melanibooks.gr/showproduct.asp?catid=359%20and%201=1<br><br>in there defence i must say they have an IDS with session snyping ..<br><br>http://www.melanibooks.gr/showproduct.asp?catid=359%20and%201=1 union select 1<br><br>but then again they must have cheaped out on the software or on the sysadmins<br>because you can foul it by doing this <br><br>http://www.melanibooks.gr/showproduct.asp?catid=359%20and%201=1 union/*anything this is an sql comment*/ select 1<br><br><br>btw is session sniping with http traffic not inherrently sensless...<br><br><br>i emailed them months ago... nothing<br><br>only thing that changed after month's that you couldn't login anymore with<br>username:' or '1<br>password: ' or '1<br><br>yes ok it's a bit offtopic but i have been meaning to disclose this just because it pisses me off how unsafe <br>some charlatans are with your details online ...
  • 02/02/2007 09:47
    quangntenemy's Avatar quangntenemy 7120
    Not SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot Specified
    Well just pwn them and their eyes will be wide open <img alt="\&quot;;D\&quot;" src="%5C">
  • 02/02/2007 09:47
    UnknownUser's Avatar UnknownUser 2,7290
    Not SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot Specified
    i'm not a pwn'ing kinda guy<br><br>the worst defacement i ever done was add a \".\" character for about a minute<br>just to make sure that i wasn't in a honeypot
  • 02/02/2007 09:47
    HynFaerie's Avatar HynFaerie 1740
    Not SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot Specified
    just like rhican sayed, you'd be surprised on how many sys admins dont listen. However I realised that in some cases they just dont have any knowledgeble admins... MerchCO-online is one... and they lost a few credit card numbers/paypal numbers because a simple [' or '1] straight to the admin account... *fixed now i believe though... bout bloody time* . Paypal has a nice fraud check thing, and they do listen to holes, which they fix really quickly =) <br><br>rhican, it's been a while hasn't it?
  • 02/02/2007 09:47
    UnknownUser's Avatar UnknownUser 2,7290
    Not SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot Specified
    I don't really understand your question.<br><br>however this link might be slightly relevant (although it looks a bit dodgy)<br>http://momby.livejournal.com/
  • 02/02/2007 09:47
    quangntenemy's Avatar quangntenemy 7120
    Not SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot Specified
    Looks like a honeypot to me
  • 02/02/2007 09:47
    aceldama's Avatar aceldama 4340
    Not SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot SpecifiedNot Specified
    i didn't know exactly where to put this, so i decided on adding to this thread instead of creating a new one. essencially it's loosely related to the whole myspace theme.<br><br>social networking sites have always been something interesting to \"get into without geting into\" for me. so recently i've just been poking around and (no, i didn't hack into myspace but) found some site that i assume are run by hackers for the purpose of viewing private profiles if you're willing to blindly part with your cash. these sites can be found here and are both run by (what i asume to be ) the same people (as will become apparent that they didn't change their code framework):<br><br> -- hxxp://eskobarcartel.com/NEWHACK23.swf<br> -- hxxp://www.myspacegtx.com/main.swf<br><br>now the interesting thing is in the sourcecode of these swf files. apparently they don't really care about any way or form of sensitive directory disclosure (apart from the assumption that people can't get into an swf file). in the first one the sourcecode looks like this:<br><br><pre> ... tries = 3; redirect_url = \"yes\"; sealed_txt = \"Status Sealed, contact your local admin\"; wrong_txt = \"Wrong password or Username, please try again\"; xml_path = \"xml/users.xml\"; ... </pre><br><br>note the xml_path variable which yields:<br><br><pre> ... &lt;user&gt; fucck &lt;pass&gt;notsomuch111&lt;/pass&gt; &lt;url&gt;http://www.myspace.com/tixv3&lt;/url&gt; &lt;/user&gt; &lt;user&gt; lbaby &lt;pass&gt;muser01&lt;/pass&gt; &lt;url&gt;http://www.myspace.com/tixv3&lt;/url&gt; &lt;/user&gt; &lt;user&gt; matty &lt;pass&gt;wallyhead&lt;/pass&gt; &lt;url&gt;http://www.myspace.com/tixv3&lt;/url&gt; &lt;/user&gt; ... </pre><br><br>the second actually uses the exact same directory, though it wasn't saved in the main file. you can find that in the section_5.swf file which was linked from main.swf, yet everything was again completely unencrypted and incidentally uses the exact same code to fetch it. now if you were lazy you could just have checked the headers that were exchanged. there you'll find that both the swf files called users.xml directly using a get request. using firefox's live headers extention it wouldv'e looked like this:<br><br><pre> ... GET /xml/users.xml HTTP/1.1 Host: www.myspacegtx.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-GB; rv:1.8.1.14) Gecko/20080404 Firefox/2.0.0.14 ... </pre><br><br>now before you get all excited, though this gets you to log in, unfortunately it doesn't get you anywhere except the page that tells you that - had you paid for it - you've probably just wasted about $14 of your hard earned cash...<br><br>...moral of the story?<br> 1) don't pay for dodgy services<br> 2) even if you assume that the average joe can't get into your swf files, do't assume no one else can.

Page 1 of 2