Monday, March 4, 2024

New Burp Suite Version 1.7.23 adds support for 5 new Vulnerabilities

Burp Suite is a graphical tool for testing Web application security. The tool is composed in Java and created by PortSwigger Security.

Burp Scanner is composed by industry-driving penetration testers. Burp Scanner incorporates a full static code investigation engine for the discovery of security vulnerabilities.

Burp’s scanning logic is persistently refreshed with upgrades to guarantee it can locate the most recent vulnerabilities.

This release adds support for 5 new Vulnerabilities

  • CSS injection – reflected and stored.
  • Link manipulation – reflected and stored.
  • Client-side HTTP parameter pollution – reflected and stored.
  • Form action hijacking – reflected and stored.
  • Open redirection – stored.

CSS injection

CSS injection vulnerabilities emerge when an application imports a template from a client provided URL, or implants client input in CSS hinders without sufficient escaping.

They are firmly correlated with cross-site scripting (XSS) vulnerabilities however regularly trickier to abuse it.

  • Executing arbitrary JavaScript using IE’s expression() function.
  • Using CSS selectors to read parts of the HTML source, which may include sensitive data such as anti-CSRF tokens.
  • Capturing any sensitive data within the URL query string by making a further style sheet import to a URL on the attacker’s domain, and monitoring the incoming Referer header.

Link Manipulation

Link manipulation happens once associated application embeds user input into the trail or domain of URLs that seem at intervals application responses.

An attacker can use this vulnerability to construct a link that, if visited by another application user, can modify the target of URLs at intervals the response.

It’s going to be potential to leverage this to perform varied attacks, such as:

  • Manipulating the path of an on-site link that has sensitive parameters in the URL. If the response from the modified path contains references to off-site resources, then the sensitive data might be leaked to external domains via the Referer header.
  • Manipulating the URL targeted by a form action, making the form submission have unintended side effects.
  • Manipulating the URL used by a CSS import statement to point to an attacker uploaded a file, resulting in CSS injection.
  • Injecting on-site links containing XSS exploits, thereby bypassing browser anti-XSS defenses, since those defenses typically do not operate on on-site links.

Client Side HTTP Parameter

Client-side protocol parameter pollution (HPP) vulnerabilities arise once associated application embeds user input in URLs in an unsafe manner.

An attacker will use this vulnerability to construct a universal resource locator that, if visited by another application user, can modify URLs at intervals the response by inserting extra question string parameters and typically predominate existing ones.

This might lead to links and forms having sudden facet effects. The security impact of this issue depends for the most part on the character of the appliance practicality.

Form action hijacking

Form action hijacking vulnerabilities arise once application places user-supplied input into the action URL of an HTML form.

An attacker will use this vulnerability to construct an URL that, if visited by another application user, can modify the action address of a kind to purpose to the attacker’s server.

If a user submits the form then its contents, together with any input from the victim user, are going to be delivered to the attacker server.

Even if the user does not enter any sensitive info, the form should still deliver a legitimate CSRF token to the attacker, allowing them to perform CSRF attacks.

Open redirection

Open redirection vulnerabilities emerge when an application joins client controllable information into the target of a redirection in a dangerous way.

An attacker can develop a URL inside the application that makes a redirection to an arbitrary external domain. This conduct can be utilized to encourage phishing assaults against clients of the application.

Also Read


Latest articles

US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp

Meta, the company that owns WhatsApp, filed a lawsuit against NSO Group in 2019....

New SSO-Based Phishing Attack Trick Users into Sharing Login Credentials  

Threat actors employ phishing scams to trick individuals into giving away important details like...

U.S. Charged Iranian Hacker, Rewards up to $10 Million

The United States Department of Justice (DoJ) has charged an Iranian national, Alireza Shafie...

Huge Surge in Ransomware-as-a-Service Attacks targeting Middle East & Africa

The Middle East and Africa (MEA) region has witnessed a surge in ransomware-as-a-service (RaaS)...

New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID

SolarWinds cyberattack was one of the largest attacks of the century in which attackers...

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles