######################################## Arora qrc: dialog XSS and DoS Vendor URL:http://code.google.com/p/arora/ Advisore: http://lostmon.blogspot.com.es/2012/07/arora-qrc-dialog-xss-and-dos.html Vendor notify:NO exploit available:yes ####################################### Arora is a lightweight cross-platform web browser. It's free (as in free speech and free beer). Arora runs on Linux, embedded Linux, FreeBSD, Mac OS X, Windows, Haiku, and any other platforms supported by the Qt toolkit. Arora uses the QtWebKit port of the fully standards-compliant WebKit layout engine. It features fast rendering, powerful JavaScript engine and supports Netscape plugins. Arora contains a two flaws that allows a remote cross site scripting (XSS) attack and DoS. This flaw exists because the application does not validate the qrc: Uri dialog and internal error pages. This may allow a user to create a specially crafted Link/url that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the qrc handler ( local ). Also Arora has a second flaw that allow Denial of service or app to crash in a special link. ################# Proof of Concept ################# create a html doc and write this code, click in the link and it execute the xss and if accept the alert box, the app crash :) '>Arora about: handler XSS ################ Versions afected ################ Tested on windows 7 ultimate 32 bits Arora 0.10.0 Windows Qt 4.5.3 ################## Solution ################### No solution was available at this time !!! ################ €nd #################### -- atentamente: Lostmon (lostmon@gmail.com) Web-Blog: http://lostmon.blogspot.com/ Google group: http://groups.google.com/group/lostmon (new) -- La curiosidad es lo que hace mover la mente....