oss-sec mailing list archives
Re: Checking existence of firewalled URLs via javascript's script.onload
From: Peter Philip Pettersson <philip.pettersson () gmail com>
Date: Wed, 19 Apr 2023 07:53:14 -0700
Hi George, There are many ways to make arbitrary HTTP requests through a browser, with and without Javascript. Here's a good writeup from 2018 from the makers of Burp Suite: https://portswigger.net/research/exposing-intranets-with-reliable-browser-based-port-scanning I wouldn't consider this a vulnerability in the browser. Btw, I remember your exploits from the early 2000s - good stuff :) Regards, Philip On Wed, Apr 19, 2023 at 6:31 AM Georgi Guninski <gguninski () gmail com> wrote:
There is minor information disclosure vulnerability similar
to nmap in browser.
It is possible to check the existence of firewalled URL U via
the following javascript in a browser:
<script src="U"
onload="alert('Exists')"
onerror="alert('Does not exist')">
This might have privacy implication on potentially
"semi-blind CSRF" (XXX does this makes sense?).
Works for me in Firefox, Chrome and Chromium 112.
I believe the issue won't be fixed because it will break
stuff in the mess called internet.
For online test:
https://www.guninski.com/onload2.html
--
guninski: https://j.ludost.net/resumegg.pdf
Current thread:
- Checking existence of firewalled URLs via javascript's script.onload Georgi Guninski (Apr 19)
- Re: Checking existence of firewalled URLs via javascript's script.onload Peter Philip Pettersson (Apr 19)
- Re: Checking existence of firewalled URLs via javascript's script.onload Georgi Guninski (Apr 20)
- Re: Checking existence of firewalled URLs via javascript's script.onload Jeremy Stanley (Apr 20)
- Re: Checking existence of firewalled URLs via javascript's script.onload Georgi Guninski (Apr 20)
- Re: Checking existence of firewalled URLs via javascript's script.onload Peter Philip Pettersson (Apr 19)
