Crossdomain XML
Crossdomain XML
Crossdomain XML
The Flash cross-domain policy controls whether Flash client components running on
other domains can perform two-way interaction with the domain that publishes the
policy. If another domain is allowed by the policy, then that domain can
potentially attack users of the application. If a user is logged in to the
application, and visits a domain allowed by the policy, then any malicious content
running on that domain can potentially gain full access to the application within
the security context of the logged in user.
Even if an allowed domain is not overtly malicious in itself, security
vulnerabilities within that domain could potentially be leveraged by a third-party
attacker to exploit the trust relationship and attack the application that allows
access. Any domains that are allowed by the Flash cross-domain policy should be
reviewed to determine whether it is appropriate for the application to fully trust
both their intentions and security posture.
Any inappropriate entries in the Flash cross-domain policy file should be removed.
step to reproduce
request
response
HTTP/1.1 200 OK
Date: Sun, 19 Jul 2020 10:10:04 GMT
Content-Type: text/xml
Connection: close
Server: nginx
Last-Modified: Thu, 27 Aug 2015 22:17:13 GMT
Content-Length: 112
<?xml version="1.0"?>
<cross-domain-policy>
<allow-access-from domain="*.foxycart.com" />
</cross-domain-policy>
POC
These cross-domain policy files mean to allow Flash and Silverlight applications
hosted on other domains to access its data:
Silverlight clientaccesspolicy.xml
impact
An attacker may be able to bypass the web browser's same-origin policy. An attacker
can exploit the weakness to manipulate or steal cookies, create requests that can
be mistaken for those of a valid user, compromise confidential information, or
execute malicious code on the end user systems for a variety of nefarious purposes.
Other damaging attacks include the disclosure of end user files, installation of
Trojan horse programs, redirecting the user to some other page or site, running
ActiveX controls (under Microsoft Internet Explorer) from sites that a user
perceives as trustworthy, and modifying presentation of content.