Iframe injection and self xss on more than 20,000 sites alexarank UA / RU
I am an independent security researcher securityz.net , the first place in the bug bounty of PrivatBank.
I decided to walk on top of alexarank , I began to look for vulnerabilities on gismeteo.ua (20th place). There was a redirect to the Russian version ( www.gismeteo.ru/soft/ ), drew attention to the technical support.
Technical support was located at gismeteo.userecho.com and downloaded to gismeteo in iframe:
I tried to load my website into iframe https://gismeteo.userecho.com/s/interframe.html?url=https://securityz.net, but it did not load. Then I realized that in addition to the url of the download site, the variables lang, referer, xdm_e and others are also needed.
It turned out that the owner of the widget userecho.com uses the same API on all client sites for technical support, hence the conclusion that all his clients are vulnerable to iframe injection.
- drugvokrug.ru (social network, more than 5 000 000 users),
- fl.ru (the most popular freelance exchange in Russia)
- easypay.ua (one of the most visited payment systems in Ukraine)
- tankionline.com
- ivi.ru
- amiro.ru
- okko.tv
- insales.ru
- a-lab.ru
- scrapinghub.com
- iridiummobile.net and many others.
Almost all sites place the userecho widget on their subdomain, an example is ask.drugvokrug.ru , but some place it as a subdomain on userecho kontur.userecho.com . Also userecho clients can be searched on google / yandex dorkam.
Attack vectors:
1. Phishing - load your site, within which one into one is the same site as the original, and it can not be distinguished from the original, the victim enters his data and they come to me! (login, password, credit card numbers, cvv2 - easypay.ua and others).
3. Run malicious code on the vulnerable site. You can of course run javascript on the vulnerable site, but not in the context of the domain (alert on my site):
To spread a malicious link, you must first shorten the link goo.gl/GIYRUR, then:
Massively send to forums, to email addresses.
Purposefully attack a specific user or admin using this vulnerability.
It would be possible to send vulnerability messages to each vulnerable site, but the vulnerability would be promptly corrected by the userecho developers and I could not get anything from the vulnerable sites or from the widget developers.
Therefore, I decided to immediately inform the plug-in developers about the find.
01/09/2017 at 23:00: a bug report was sent in support of userecho.com.
01/10/2017 at 00:10: the vulnerability has been fixed and the vulnerable interframe.html file has been deleted (comment from the developers - the interframe.html file is no longer available (deleted) and all widgets work without it. Therefore, everything works with the same API.).
01/10/2017 at 02:14: developers paid a reward of $ 100. Comment:
You must understand that we are not such a large company. In addition, it is generally the first time when we decided to give someone a monetary reward.
I also found a SELF XSS vulnerability in userecho support and are not going to fix it, more than 20 thousand sites are vulnerable, here is the article and PoC.
I barely persuaded the developers to eliminate iframe injection:
We saw from the logs that you played with interframe.html and basically understood why and how it was used. Only the option how to use it with benefit was not clear.
Since now we understand the use cases and you have prompted us to correct, we are ready to transfer you 100USD .
+ Found another xss vulnerability in this widget, no one is going to fix it