Changes for page Application_Webkit

Last modified by Nicolas Gregoire on 2012/01/14 17:48

From version < 14.1 >
edited by Nicolas Gregoire
on 2012/01/14 00:38
To version < 15.2 >
edited by Nicolas Gregoire
on 2012/01/14 00:42
Change comment: Added tag [webkit, libxslt, metasploit, webOS, Apple, Safari, iPhone, iPad]



Icon Page properties
... ... @@ -1,0 +1,1 @@
1 +webkit|libxslt|metasploit|webOS|Apple|Safari|iPhone|iPad
... ... @@ -47,3 +47,5 @@
47 47  
48 48  * [[webos-root-backdoor.xml>>attach:webos-root-backdoor.xml]] contains the configurable data (name and content of the destination file) and a processing instruction triggering the XSLT code
49 49  * [[webos-root-backdoor.xsl>>attach:webos-root-backdoor.xsl]] reads the XML file and create the requested file on disk. This version overwrites a script located in /etc/default/ with a version including a reverse-shell based on netcat
50 +
51 +Browsing the XML file from a vulnerable device is enough to trigger the exploit.


Welcome on the XSLT Hacking Encyclopedia !

You may be interested by the Engines and Applications pages.

Link to the blog
Twitter: @Agarri_FR

Tag Cloud

Failed to execute the [velocity] macro. Cause: [The execution of the [velocity] script macro is not allowed in [xhe:XWiki.TagCloud]. Check the rights of its last author or the parameters if it's rendered from another script.]. Click on this message for details.

Content by Nicolas Grégoire / Agarri
Blog - Follow me @Agarri_FR