Dark Mode
Capec-104 Detail
Cross Zone Scripting
Standard Software Likelihood: Medium Typical Severity: High
Parents: 233
Threats: T73 T281 T293 T338 T387 T400
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-104 | capec | https://capec.mitre.org/data/definitions/104.html | |
| CWE-250 | cwe | http://cwe.mitre.org/data/definitions/250.html | |
| CWE-638 | cwe | http://cwe.mitre.org/data/definitions/638.html | |
| CWE-285 | cwe | http://cwe.mitre.org/data/definitions/285.html | |
| CWE-116 | cwe | http://cwe.mitre.org/data/definitions/116.html | |
| CWE-20 | cwe | http://cwe.mitre.org/data/definitions/20.html |
Explore
-
Find systems susceptible to the attack: Find systems that contain functionality that is accessed from both the internet zone and the local zone. There needs to be a way to supply input to that functionality from the internet zone and that original input needs to be used later on a page from a local zone.
| Techniques |
|---|
| Leverage knowledge of common local zone functionality on targeted platforms to guide attempted injection of code through relevant internet zone mechanisms. In some cases this may be due to standard system configurations enabling shared functionality between internet and local zones. The attacker can search for indicators that these standard configurations are in place. |
Experiment
-
Find the insertion point for the payload: The attacker first needs to find some system functionality or possibly another weakness in the system (e.g. susceptibility to cross site scripting) that would provide the attacker with a mechanism to deliver the payload (i.e. the code to be executed) to the user. The location from which this code is executed in the user's browser needs to be within the local machine zone.
| Techniques |
|---|
| Finding weaknesses in functionality used by both privileged and unprivileged users. |
Exploit
-
Craft and inject the payload: Develop the payload to be executed in the higher privileged zone in the user's browser. Inject the payload and attempt to lure the victim (if possible) into executing the functionality which unleashes the payload.
| Techniques |
|---|
| The attacker makes it as likely as possible that the vulnerable functionality into which they have injected the payload has a high likelihood of being used by the victim. |
| Leverage cross-site scripting vulnerability to inject payload. |
- The target must be using a zone-aware browser.
- None: No specialized resources are required to execute this type of attack.
| Medium |
|---|
| Ability to craft malicious scripts or find them elsewhere and ability to identify functionality that is running web controls in the local zone and to find an injection vector into that functionality |
| Integrity | Availability | Authorization | Access Control | Confidentiality |
|---|---|---|---|---|
| Modify Data | Execute Unauthorized Commands (Run Arbitrary Code) | Gain Privileges | Gain Privileges | Read Data |
| Execute Unauthorized Commands (Run Arbitrary Code) | Gain Privileges | |||
| Execute Unauthorized Commands (Run Arbitrary Code) |
- There was a cross zone scripting vulnerability discovered in Skype that allowed one user to upload a video with a maliciously crafted title that contains a script. Subsequently, when the victim attempts to use the "add video to chat" feature on attacker's video, the script embedded in the title of the video runs with local zone privileges. Skype is using IE web controls to render internal and external HTML pages. "Add video to chat" uses these web controls and they are running in the Local Zone. Any user who searched for the video in Skype with the same keywords as in the title field, would have the attackers' code executing in their browser with local zone privileges to their host machine (e.g. applications on the victim's host system could be executed).