├── .gitignore ├── README.md ├── nullsec-adium.txt ├── nullsec-audiocrusher.txt ├── nullsec-chrome.txt ├── nullsec-easyftp.txt ├── nullsec-icq-02.txt ├── nullsec-icq.txt ├── nullsec-microwebersqli.txt ├── nullsec-opera-02.txt ├── nullsec-opera.txt ├── nullsec-skype-02.txt ├── nullsec-skype.txt └── nullsec-worldmail.txt /.gitignore: -------------------------------------------------------------------------------- 1 | .swp 2 | .swn 3 | .swo 4 | .key 5 | .DS_Store 6 | .git 7 | .pyc 8 | __pycache__ 9 | id_rsa 10 | id_dsa 11 | passwd 12 | shadow 13 | .bash_history 14 | .zsh_history 15 | .zhistory 16 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | About 2 | ----- 3 | Within this section we publish some of our advisories for well known hardware 4 | and software resources. Sometimes we include a full working exploit, sometimes 5 | we don't. It simply depends on our mood. 6 | 7 | If you find some bugs or if you have any questions, ideas or criticism regarding 8 | to this section, feel free to message us. 9 | 10 | Disclaimer 11 | ---------- 12 | We hereby emphasize, that the hacking related stuff on 13 | [nullsecurity.net](http://nullsecurity.net) is only for education purposes. 14 | We are not responsible for any damages. You are responsible for your own 15 | actions. 16 | -------------------------------------------------------------------------------- /nullsec-adium.txt: -------------------------------------------------------------------------------- 1 | =============================================================================== 2 | | | 3 | ____ _ __ 4 | ___ __ __/ / /__ ___ ______ ______(_) /___ __ 5 | / _ \/ // / / (_- -_) __/ // / __/ / __/ // / 6 | /_//_/\_,_/_/_/___/\__/\__/\_,_/_/ /_/\__/\_, / 7 | /___/ team 8 | 9 | PUBLIC SECURITY ADVISORY 10 | | | 11 | =============================================================================== 12 | 13 | 14 | TITLE 15 | ===== 16 | 17 | Adium - HTML/Javascript - Cross Site Scripting Vulnerability 18 | 19 | 20 | AUTHOR 21 | ====== 22 | 23 | noptrix 24 | 25 | 26 | DATE 27 | ==== 28 | 29 | 08-02-2011 30 | 31 | 32 | VENDOR 33 | ====== 34 | 35 | Adium - http://www.adium.im/ 36 | 37 | 38 | AFFECTED PRODUCT 39 | ================ 40 | 41 | Adium in version <= 1.4.2 42 | 43 | 44 | AFFECTED PLATFORMS 45 | ================== 46 | 47 | Mac OS X (10.6.8, 10.6.7, maybe other also...) 48 | 49 | 50 | VULNERABILITY CLASS 51 | =================== 52 | 53 | Cross Site Scripting 54 | 55 | 56 | DESCRIPTION 57 | =========== 58 | 59 | Adium suffers from a persistent HTML/Javascript injection / Cross-Site Scripting 60 | vulnerability due to a lack of input validation and output sanitization of 61 | filenames. 62 | 63 | 64 | PROOF OF CONCEPT 65 | ================ 66 | 67 | The following HTML/Javascript payload can be used as a filename to trigger the 68 | described vulnerability: 69 | 70 | --- SNIP --- 71 | 72 | sh3ll$ echo "123" > \"\>\
\