CSS injection in avito.ru via IE11

Disclosed: 2019-12-12 09:33:57 By hussain_0x3c To avito
Medium
Vulnerability Details
Hi Team Security @avito I discovered [CSS Injection](https://portswigger.net/knowledgebase/issues/details/00501300_cssinjectionreflected) on [avito.ru](https://avito.ru) in `form search` via IE11 ####Description `CSS injection` vulnerabilities arise when an application imports a style sheet from a **user-supplied URL**, or embeds user input in CSS blocks without adequate escaping. They are closely related to cross-site scripting (XSS) vulnerabilities but often trickier to exploit. Being able to inject arbitrary CSS into the victim's browser may enable various attacks, including : - Executing arbitrary JavaScript using IE's expression() function. - Using CSS selectors to read parts of the HTML source, which may include sensitive data such as anti-CSRF tokens. - Capturing any sensitive data within the URL query string by making a further style sheet import to a URL on the attacker's domain, and monitoring the incoming Referer header. **Affected URL** ~~~ https://www.avito.ru/rossiya/nedvizhimost?s='><b/style=position:fixed;top:0;left:0;font-size:200px>XSS<!-- ~~~ ####Proof of Concept {F228726} ####Remediation Ensure that user input is adequately escaped before embedding it in CSS blocks, and consider using a whitelist to prevent loading of arbitrary style sheets. ####References [Malicious CSS](http://mksben.l0.cm/2015/10/css-based-attack-abusing-unicode-range.html) **Best Regards** Hussain Adnan
Actions
View on HackerOne
Report Stats
  • Report ID: 276747
  • State: Closed
  • Substate: resolved
  • Upvotes: 9
Share this report