Bitcoin Forum
November 16, 2024, 08:11:00 PM *
News: Check out the artwork 1Dq created to commemorate this forum's 15th anniversary
 
   Home   Help Search Login Register More  
Pages: [1] 2 3 »  All
  Print  
Author Topic: --  (Read 1090 times)
Boris007 (OP)
Member
**
Offline Offline

Activity: 192
Merit: 72

Security


View Profile
June 18, 2020, 05:51:18 AM
Last edit: July 10, 2020, 03:28:42 AM by Boris007
Merited by suchmoon (7), LoyceV (6), TryNinja (1), dragonvslinux (1), ChuckBuck (1)
 #1

--

Vod
Legendary
*
Offline Offline

Activity: 3892
Merit: 3166


Licking my boob since 1970


View Profile WWW
June 18, 2020, 05:57:37 AM
Merited by Boris007 (1)
 #2

Good on you for exposing this before some hacker took advantage.

OG has been reminding me how I couldn't secure my hobby site, and he makes the same mistake while holding other people's coin.  :/

I post for interest - not signature spam.
https://elon.report - new BPI Reports!
https://vod.fan - fast/free image sharing - coming Nov
ChuckBuck
Hero Member
*****
Offline Offline

Activity: 1372
Merit: 783


better everyday ♥


View Profile WWW
June 18, 2020, 01:18:40 PM
 #3

I am curious to know what OG will do after this thread  Cheesy I am also concerned that if what OP says really exists, has anyone taken advantage of it? Specifically this
A malicious person can inject a shell script and get the personal deposit address of respected accounts, email..etc along with server information. If the website as claimed to operate 1000s of BTC then the vulnerability is intensified.

OG has been reminding me how I couldn't secure my hobby site, and he makes the same mistake while holding other people's coin.  :/
I thought that you and OG weren't really close, there was some conflict between you and him. Are you still talking to each other?  Cheesy

CharityAuction
          ▄▄▄████████▄▄▄   
       ▄▄███████▀▀▀▀███████▄
     ▄████▀▀           ▀▀████▄
   ▄███▀▀   ▄▄████████▄▄   ▀▀███▄
  ████▀   ████▀██████████    ▀███▄
 ████   ▄███▀▄  ▀    ██████   ▀███▄
▄███   ████▄    ▄█▄  ▀██████    ███▄
████  ▄███▀     ▀█▀      ▀███▄  ████
████  ████▄▄█▄      ▄█▄   ████  ████
████  ▀████████▄   ███▀  ▄███▀  ████
▀███   █████████▄   ▀   ▀████   ███▀
 ████   ▀████████   ▄ ▀▄▄██    ████
  ████▄   ███████▄▄██▄▄███   ▄████
   ▀███▄▄   ▀▀████████▀▀   ▄▄███▀
     ▀████▄▄            ▄▄████▀
       ▀▀███████▄▄▄▄███████▀▀
           ▀▀▀████████▀▀▀
          ▄▄▄████████▄▄▄   
       ▄▄███████▀▀▀▀███████▄
     ▄████▀▀           ▀▀████▄
   ▄███▀▀   ▄▄████████▄▄   ▀▀███▄
  ████▀   ████▀██████████    ▀███▄
 ████   ▄███▀▄  ▀    ██████   ▀███▄
▄███   ████▄    ▄█▄  ▀██████    ███▄
████  ▄███▀     ▀█▀      ▀███▄  ████
████  ████▄▄█▄      ▄█▄   ████  ████
████  ▀████████▄   ███▀  ▄███▀  ████
▀███   █████████▄   ▀   ▀████   ███▀
 ████   ▀████████   ▄ ▀▄▄██    ████
  ████▄   ███████▄▄██▄▄███   ▄████
   ▀███▄▄   ▀▀████████▀▀   ▄▄███▀
     ▀████▄▄            ▄▄████▀
       ▀▀███████▄▄▄▄███████▀▀
           ▀▀▀████████▀▀▀
ColdScam
Boris007 (OP)
Member
**
Offline Offline

Activity: 192
Merit: 72

Security


View Profile
June 18, 2020, 01:55:19 PM
 #4

I am curious to know what OG will do after this thread  Cheesy I am also concerned that if what OP says really exists, has anyone taken advantage of it? Specifically this
A malicious person can inject a shell script and get the personal deposit address of respected accounts, email..etc along with server information. If the website as claimed to operate 1000s of BTC then the vulnerability is intensified.

Why don't you try it yourself??

1. Go to: https://analyzer.nastyfans.org/?s=1

2. Inside the search, paste:  
Code:
"><script>alert('Boris007 was here')</script>

3. Press submit and see the XXS being execute.
___________________________________________________

You simply cannot go to every search button and paste the script to check if the pop up comes or not, you need to dig inside the code to find if there is any reflected parameter or not, how does the sanitizer for the current website works..etc.

That is why I pasted so many screenshots as I was doing research on the website for the vulnerability bounty, but all in vain.

So far what I have tried on bitcointalk, believe me bitcointalk has some of great script protection. I have tried a lot to execute all kinds of XSS but it blocks me. I hope theymos is paying too much to cloudflare.
Bitcointalk has some smart sanitization for every input but just not for merit where 1ds as merit amount will surely let you spend 1 merit but ds1 won't.
On top of all, it is the attitude of a person, theymos has always entertained me for any problem that I have ever reported to me, unlike saying don't tell me I don't operate the site.

suchmoon
Legendary
*
Offline Offline

Activity: 3864
Merit: 9090


https://bpip.org


View Profile WWW
June 18, 2020, 02:36:24 PM
Merited by Boris007 (1)
 #5

I am also concerned that if what OP says really exists, has anyone taken advantage of it?

It does exist. To take advantage of it the attacker would have to coerce someone to visit attacker's site and nastyfans site at the same time (in the same browser session) and obviously have JS enabled. This is a serious hole. I hope there are e-mail confirmations or 2FA for any withdrawals etc.
Boris007 (OP)
Member
**
Offline Offline

Activity: 192
Merit: 72

Security


View Profile
June 18, 2020, 02:42:16 PM
 #6

I am also concerned that if what OP says really exists, has anyone taken advantage of it?

It does exist. To take advantage of it the attacker would have to coerce someone to visit attacker's site and nastyfans site at the same time (in the same browser session) and obviously have JS enabled. This is a serious hole. I hope there are e-mail confirmations or 2FA for any withdrawals etc.

Nastyfans is vulnerable to  CWE 601 open redirect vulnerability too.

To anawer your question , tgey dont have 2fa or even a email.confirmation system.

ChuckBuck
Hero Member
*****
Offline Offline

Activity: 1372
Merit: 783


better everyday ♥


View Profile WWW
June 18, 2020, 03:54:08 PM
 #7

To take advantage of it the attacker would have to coerce someone to visit attacker's site and nastyfans site at the same time (in the same browser session) and obviously have JS enabled.
It seems that I lack knowledge about this, can you explain it more clearly? How can that be? Something called coerce? It is really difficult to force someone to do what the attacker wants, unless they have tricks to cover the user's eyes. Right?  Roll Eyes

CharityAuction
          ▄▄▄████████▄▄▄   
       ▄▄███████▀▀▀▀███████▄
     ▄████▀▀           ▀▀████▄
   ▄███▀▀   ▄▄████████▄▄   ▀▀███▄
  ████▀   ████▀██████████    ▀███▄
 ████   ▄███▀▄  ▀    ██████   ▀███▄
▄███   ████▄    ▄█▄  ▀██████    ███▄
████  ▄███▀     ▀█▀      ▀███▄  ████
████  ████▄▄█▄      ▄█▄   ████  ████
████  ▀████████▄   ███▀  ▄███▀  ████
▀███   █████████▄   ▀   ▀████   ███▀
 ████   ▀████████   ▄ ▀▄▄██    ████
  ████▄   ███████▄▄██▄▄███   ▄████
   ▀███▄▄   ▀▀████████▀▀   ▄▄███▀
     ▀████▄▄            ▄▄████▀
       ▀▀███████▄▄▄▄███████▀▀
           ▀▀▀████████▀▀▀
          ▄▄▄████████▄▄▄   
       ▄▄███████▀▀▀▀███████▄
     ▄████▀▀           ▀▀████▄
   ▄███▀▀   ▄▄████████▄▄   ▀▀███▄
  ████▀   ████▀██████████    ▀███▄
 ████   ▄███▀▄  ▀    ██████   ▀███▄
▄███   ████▄    ▄█▄  ▀██████    ███▄
████  ▄███▀     ▀█▀      ▀███▄  ████
████  ████▄▄█▄      ▄█▄   ████  ████
████  ▀████████▄   ███▀  ▄███▀  ████
▀███   █████████▄   ▀   ▀████   ███▀
 ████   ▀████████   ▄ ▀▄▄██    ████
  ████▄   ███████▄▄██▄▄███   ▄████
   ▀███▄▄   ▀▀████████▀▀   ▄▄███▀
     ▀████▄▄            ▄▄████▀
       ▀▀███████▄▄▄▄███████▀▀
           ▀▀▀████████▀▀▀
ColdScam
bob123
Legendary
*
Offline Offline

Activity: 1624
Merit: 2481



View Profile WWW
June 18, 2020, 05:54:29 PM
Merited by OgNasty (2), Foxpup (2), TryNinja (1)
 #8

Effect:

A malicious person can inject a shell script and get the personal deposit address of respected accounts, email..etc along with server information. If the website as claimed to operate 1000s of BTC then the vulnerability is intensified.

What you have shown is "just" a reflected XSS, not a persistent one.
You would need to send the URL with the injected code as a parameter to a person. That person would need to click on that link and have JS enabled for the script to be executed.

You can't inject a script into the server this way. And you definitely can't steal data from the server with this method.



It does exist. To take advantage of it the attacker would have to coerce someone to visit attacker's site and nastyfans site at the same time (in the same browser session) and obviously have JS enabled. This is a serious hole. I hope there are e-mail confirmations or 2FA for any withdrawals etc.

This still depends on whether and how the same-origin-policy is implemented.

suchmoon
Legendary
*
Offline Offline

Activity: 3864
Merit: 9090


https://bpip.org


View Profile WWW
June 18, 2020, 06:08:06 PM
 #9

It seems that I lack knowledge about this, can you explain it more clearly? How can that be? Something called coerce? It is really difficult to force someone to do what the attacker wants, unless they have tricks to cover the user's eyes. Right?  Roll Eyes

It's all explained in great detail here.

This still depends on whether and how the same-origin-policy is implemented.

True. It's not quite as simple as I made it sound.
Vod
Legendary
*
Offline Offline

Activity: 3892
Merit: 3166


Licking my boob since 1970


View Profile WWW
June 18, 2020, 10:41:14 PM
 #10

Very sloppy work.   While spending a few minutes, I clicked on his analyzer link, and it nicely analyzed some of the projects he was involved with over the years.

http://www.uberbills.com/

I post for interest - not signature spam.
https://elon.report - new BPI Reports!
https://vod.fan - fast/free image sharing - coming Nov
nutildah
Legendary
*
Offline Offline

Activity: 3178
Merit: 8575


Happy 10th Birthday to Dogeparty!


View Profile WWW
June 19, 2020, 02:17:47 PM
 #11

It seems that I lack knowledge about this, can you explain it more clearly? How can that be? Something called coerce? It is really difficult to force someone to do what the attacker wants, unless they have tricks to cover the user's eyes. Right?  Roll Eyes

It's all explained in great detail here.

That's a decent explanation but I prefer this one. You have to listen to at least 40 seconds of it to get its full implication.

▄▄███████▄▄
▄██████████████▄
▄██████████████████▄
▄████▀▀▀▀███▀▀▀▀█████▄
▄█████████████▄█▀████▄
███████████▄███████████
██████████▄█▀███████████
██████████▀████████████
▀█████▄█▀█████████████▀
▀████▄▄▄▄███▄▄▄▄████▀
▀██████████████████▀
▀███████████████▀
▀▀███████▀▀
.
 MΞTAWIN  THE FIRST WEB3 CASINO   
.
.. PLAY NOW ..
Quickseller
Copper Member
Legendary
*
Offline Offline

Activity: 2996
Merit: 2374


View Profile
June 19, 2020, 05:29:42 PM
 #12

Did you responsibly disclose the vulnerability to the site owner? Or did you first publish this report publicly?

★ ★ ██████████████████████████████[█████████████████████
██████████████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████████
███████████████████████████████████████████████████████████████████
████████████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████████
███████████████████████████████████████████████████████████████████
█████████████████████████████████████████████████████████████████████
█████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████████
█████████████████████████████████████████████████████████████
████████████████████████████████████████████████████████████
███████████████████████████████████████████████████████████████████
★ ★ 
NotATether
Legendary
*
Offline Offline

Activity: 1792
Merit: 7388


Top Crypto Casino


View Profile WWW
June 19, 2020, 05:48:21 PM
 #13

Did you responsibly disclose the vulnerability to the site owner? Or did you first publish this report publicly?

Do we know who is administrating the nastyfans.org site right now? The NastyFans service is being run by OgNasty but his thread says someone else made that website:

Bitcointalk user nonnakip has started a website for NastyFans where members can trade seats using an auction.

nonnakip has been inactive since last April so I'm not sure whether he's still managing the site today.

███████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████

███████████████████████
.
BC.GAME
▄▄▀▀▀▀▀▀▀▄▄
▄▀▀░▄██▀░▀██▄░▀▀▄
▄▀░▐▀▄░▀░░▀░░▀░▄▀▌░▀▄
▄▀▄█▐░▀▄▀▀▀▀▀▄▀░▌█▄▀▄
▄▀░▀░░█░▄███████▄░█░░▀░▀▄
█░█░▀░█████████████░▀░█░█
█░██░▀█▀▀█▄▄█▀▀█▀░██░█
█░█▀██░█▀▀██▀▀█░██▀█░█
▀▄▀██░░░▀▀▄▌▐▄▀▀░░░██▀▄▀
▀▄▀██░░▄░▀▄█▄▀░▄░░██▀▄▀
▀▄░▀█░▄▄▄░▀░▄▄▄░█▀░▄▀
▀▄▄▀▀███▄███▀▀▄▄▀
██████▄▄▄▄▄▄▄██████
.
..CASINO....SPORTS....RACING..


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
Quickseller
Copper Member
Legendary
*
Offline Offline

Activity: 2996
Merit: 2374


View Profile
June 19, 2020, 05:58:34 PM
 #14

The analyzer site appears to be run by naypalm who was active in the last week.

In any case, I don’t think someone not logging in for a long time is a reason to not make an attempt to disclose the vulnerability, even if they don’t actually receive the message or act on it.

★ ★ ██████████████████████████████[█████████████████████
██████████████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████████
███████████████████████████████████████████████████████████████████
████████████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████████
███████████████████████████████████████████████████████████████████
█████████████████████████████████████████████████████████████████████
█████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████████
█████████████████████████████████████████████████████████████
████████████████████████████████████████████████████████████
███████████████████████████████████████████████████████████████████
★ ★ 
Vod
Legendary
*
Offline Offline

Activity: 3892
Merit: 3166


Licking my boob since 1970


View Profile WWW
June 19, 2020, 11:10:26 PM
 #15

Did you responsibly disclose the vulnerability to the site owner? Or did you first publish this report publicly?

Do we know who is administrating the nastyfans.org site right now? The NastyFans service is being run by OgNasty but his thread says someone else made that website:

Bitcointalk user nonnakip has started a website for NastyFans where members can trade seats using an auction.

nonnakip has been inactive since last April so I'm not sure whether he's still managing the site today.

I sent a PM to naypalm last night, in case he is not aware of this thread.

I post for interest - not signature spam.
https://elon.report - new BPI Reports!
https://vod.fan - fast/free image sharing - coming Nov
hacker1001101001
Sr. Member
****
Offline Offline

Activity: 1288
Merit: 415


View Profile
June 20, 2020, 05:48:21 AM
 #16

Did you responsibly disclose the vulnerability to the site owner? Or did you first publish this report publicly?

This question still matter's as it's not good look or practice at testing vulnerabilities on such website's without the owner's knowledge.

OP should have atleast notified OgNasty before injecting any scripts.
bob123
Legendary
*
Offline Offline

Activity: 1624
Merit: 2481



View Profile WWW
June 20, 2020, 08:44:54 AM
 #17

Did you responsibly disclose the vulnerability to the site owner? Or did you first publish this report publicly?

According to this:

Why don't you try it yourself??
1. Go to: https://analyzer.nastyfans.org/?s=1
2. Inside the search, paste:   
Code:
"><script>alert('Boris007 was here')</script>
3. Press submit and see the XXS being execute.

I believe he initially posted it here and calls that a "responsible disclosure".

I wonder whether he got the permission to look for vulnerabilities from the server owner/administrator and hoster.



This question still matter's as it's not good look or practice at testing vulnerabilities on such website's without the owner's knowledge.

OP should have atleast notified OgNasty before injecting any scripts.

It is not just "not good", but illegal.

Boris007 (OP)
Member
**
Offline Offline

Activity: 192
Merit: 72

Security


View Profile
June 20, 2020, 09:16:05 AM
 #18

Did you responsibly disclose the vulnerability to the site owner? Or did you first publish this report publicly?

According to this:

Why don't you try it yourself??
1. Go to: https://analyzer.nastyfans.org/?s=1
2. Inside the search, paste:   
Code:
"><script>alert('Boris007 was here')</script>
3. Press submit and see the XXS being execute.

I believe he initially posted it here and calls that a "responsible disclosure".

I wonder whether he got the permission to look for vulnerabilities from the server owner/administrator and hoster.



This question still matter's as it's not good look or practice at testing vulnerabilities on such website's without the owner's knowledge.

OP should have atleast notified OgNasty before injecting any scripts.

It is not just "not good", but illegal.
The requested person was informed before disclosing it here.

Vod
Legendary
*
Offline Offline

Activity: 3892
Merit: 3166


Licking my boob since 1970


View Profile WWW
June 20, 2020, 09:51:01 AM
 #19

OP should have atleast notified OgNasty before injecting any scripts.

Is that an objective standard?  A hacker's opinion?  Or maybe just mutual respect and consideration? 

OP could have done damage if he wanted - or sold the info.  He did the moral thing, and there is nothing illegal about it.


I post for interest - not signature spam.
https://elon.report - new BPI Reports!
https://vod.fan - fast/free image sharing - coming Nov
bob123
Legendary
*
Offline Offline

Activity: 1624
Merit: 2481



View Profile WWW
June 20, 2020, 11:46:01 AM
Merited by OgNasty (2)
 #20

The requested person was informed before disclosing it here.

That's not responsible disclosure.

How much time did you give him to fix any vulnerabilities before publicly disclose them?



OP should have atleast notified OgNasty before injecting any scripts.

Is that an objective standard?  A hacker's opinion?  Or maybe just mutual respect and consideration? 

OP could have done damage if he wanted - or sold the info.  He did the moral thing, and there is nothing illegal about it.

Without the approval of the owner of the site and the hoster, it definitely is illegal. Depending on the country, maybe "just" a gray area.
You can't just start doing pentests on any website/service you encounter.

Pages: [1] 2 3 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!