########################################
Arora qrc: dialog XSS and DoS
Vendor URL:http://code.google.com/p/arora/
Advisore: http://lostmon.blogspot.com.es/2012/07/arora-qrc-dialog-xss-and-dos.html
Vendor notify:NO exploit available:yes
#######################################
Arora is a lightweight cross-platform web browser. It's free (as in free speech and free beer).
Arora runs on Linux, embedded Linux, FreeBSD, Mac OS X, Windows, Haiku, and any other platforms
supported by the Qt toolkit.
Arora uses the QtWebKit port of the fully standards-compliant WebKit layout engine.
It features fast rendering, powerful JavaScript engine and supports Netscape plugins.
Arora contains a two flaws that allows a remote cross site scripting (XSS) attack and DoS.
This flaw exists because the application does not validate the qrc: Uri dialog and
internal error pages. This may allow a user to create a specially crafted Link/url that
would execute arbitrary script code in a user's browser within the trust relationship
between their browser and the qrc handler ( local ).
Also Arora has a second flaw that allow Denial of service or app to crash in a special link.
#################
Proof of Concept
#################
create a html doc and write this code, click in the link and it execute
the xss and if accept the alert box, the app crash :)
<html><body>
<a href='qrc:/"><script>alert('Sorry, Now Your App Crash!');</script>'>Arora about: handler XSS</a>
</body></html>
################
Versions afected
################
Arora 0.10.0 Windows Qt 4.5.3
##################
Solution
###################
No solution was available at this time !!!
################ €nd ####################
--
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: http://lostmon.blogspot.com/
Google group: http://groups.google.com/group/lostmon (new)
--
La curiosidad es lo que hace mover la mente....