compat-table icon indicating copy to clipboard operation
compat-table copied to clipboard

html.exploit.cve_2016_7201-1

Open jcscott2015 opened this issue 8 years ago • 8 comments

I haven't seen this reported in a search of issues, but your compat-table site seems to be infected or at least vulnerable to the html.exploit.cve_2016_7201-1. This exploit affects Windows users. I'm on a Mac using ClamXAV, and the exploit always pops up when visiting https://kangax.github.io/compat-table/es6/. This is likely a server issue.

jcscott2015 avatar Nov 13 '17 17:11 jcscott2015

It's because of Flattr and / or other 3rd-party scripts.

@kangax could we remove some of them?

chicoxyzzy avatar Nov 13 '17 21:11 chicoxyzzy

Can you link to the exploit? What's the issue?

ljharb avatar Nov 13 '17 21:11 ljharb

Yeah, I don't mind removing them if that's the issue. But shouldn't it be reported to Flattr then? I'm also unclear on how exactly they're affected?

kangax avatar Nov 13 '17 21:11 kangax

Exploit description https://nvd.nist.gov/vuln/detail/CVE-2016-7201

Actually it seems that the problem with memory corruption could be on our side. @jcscott2015 please more info if that's possible.

chicoxyzzy avatar Nov 13 '17 21:11 chicoxyzzy

The exploit tho is in Edge, not in our JS; Edge users have an action item here, but why do we?

ljharb avatar Nov 13 '17 21:11 ljharb

IMO we can fix problem on our side too if it's easy enough

chicoxyzzy avatar Nov 13 '17 21:11 chicoxyzzy

There's nothing to fix tho ; the vulnerability is Edge users who visit a malicious website. We aren't one, and neither is Flattr, and those users should update their Edge anyways. Am I reading this CVE wrong?

ljharb avatar Nov 13 '17 22:11 ljharb

@chicoxyzzy I don't have much to add. I usually use Chrome Version 62.0.3202.94 (Official Build) (64-bit) on Mac, but Safari triggers the same infection alert. On page load, Chrome dumps a small file (247 kb) into the ClamXAV quarantine folder, while Safari dumps the whole web page (4.3 mgs).

I'm not having any memory issues with cache -- nothing in the logs. There's definitely a payload. I've attached a ZIP of one of the Chrome files.

f_00295b.zip

jcscott2015 avatar Nov 13 '17 23:11 jcscott2015