Author Topic: Potential User-triggered Vulnerability  (Read 2181 times)

0 Members and 1 Guest are viewing this topic.

REDACTED

  • Guest
Potential User-triggered Vulnerability
« on: August 18, 2016, 04:46:08 PM »
There is a potential user-triggered vulnerability that stems from the lack of content validation.

If a user clicks on the link blahblahblah.com/somePic.png, AVAST SafeZone, Chrome, FireFox and IE do not validate that the content is actually a PNG file.

This means that a malicious site can entice somebody to view a picture, load the HTML and scripts in response to the .png GET REQUEST, and then dump an actual png file after that so that he would not be the wiser about what just happened.

I believe that files for known extensions should be checked, and users seriously warned before the browser actually displays anything (and run scripts).
« Last Edit: August 18, 2016, 05:39:47 PM by ristar85 »

Offline Eddy

  • Avast Evangelist
  • Maybe Bot
  • ***
  • Posts: 31079
  • Watching (over?) you
    • Malware removal, Biljart and other things.
Re: Potential User-triggered Vulnerability
« Reply #1 on: August 18, 2016, 04:48:37 PM »
Even if it is a png file, there still can be code hidden in it.

REDACTED

  • Guest
Re: Potential User-triggered Vulnerability
« Reply #2 on: August 18, 2016, 04:51:59 PM »
Even if it is a png file, there still can be code hidden in it.

Agreed. I would suggest that Avast implement a simple content validation check first, and then check for scripts in the actual file with contents.

... Since it is a anti-virus company and all.
« Last Edit: August 18, 2016, 04:54:06 PM by ristar85 »