XSS at http://vk.com on IE using flash files

Disclosed: 2015-10-30 12:23:19 By tunnelshade To vkcom
Unknown
Vulnerability Details
**Steps** + Open the below url in **Internet Explorer** ``` http://vk.com/swf/photo_uploader_lite.swf?h=h?&onMouseOver=document.write(window.location.hash.substr(1))#<script>alert(document.domain)</script> ``` + Just hover your mouse over the page. **Minor Observations** + No "X-Content-Type-Options: nosniff" header allows IE to play the flash file directly whereas other browsers present download dialog as the content type served is **application/zip**. + No X-Frame options will allow this attack to be placed inside an iframe and run stealthily. + Other flash files such as **http://vk.com/swf/CaptureImg.swf** will also be vulnerable in a similar fashion.
Actions
View on HackerOne
Report Stats
  • Report ID: 66121
  • State: Closed
  • Substate: resolved
  • Upvotes: 2
Share this report