XSS is something every website should be aware of – test for it, because the bad hackers do.
Netsparker is a good site to explain some of the potential attacks.
The effect of XSS is to use the website to extract information, and even bypass the defenses of the server.
In some cases if the vulnerability is capable it will take control of he machine by creating a shell command line for the hacker.
Once the hacker has a command a shell line on the server, they can copy the password files, and then the hack goes to the next level of attack.
It goes on from there – until the hacker gets full control. Whatever you have is the hackers.
The _only_ way is to test your site…
review your potential services and programs running on the website
Use the alpha service evaluation sample
Or try the Sigma (∑) service evaluation sample
either way you will have a better picture of your hacker liability today.
Technet link – specific wording:
The vulnerability could allow remote code execution if a user opens a specially crafted RTF file using an affected version of Microsoft Word, or previews or opens a specially crafted RTF email message in Microsoft Outlook while using Microsoft Word as the email viewer. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.
So if a malicious RTF(Rich Text Formatting file is opened inside Microsoft Word it will allow the attacker to run commands that normally cannot be run.
So it is possible we have yet to see the full effects on this vulnerability., as viruses and other attacks are being crafted(very likely).
The Microsoft ‘fix’ initially is to not allow RTF files to be opened.
Applying the Microsoft Fix it solution, “Disable opening RTF content in Microsoft Word,” prevents the exploitation of this issue through Microsoft Word.
“This is not a fix, just a kludge” says TonyZ – as people will open these files not knowing what will happen.
we have placed a sample evaluation on our fixvirus.com site (the alpha-A scan)
Here we have scanned a server and found it had a few services turned on that should not have been. (Telnet and ftp should be replaced with a secure version, such as ssh and scp)
The web services need to be tested further for potential application vulnerabilities (with the Sigma-∑ scan)
Port 20000, and 2222 are not typical ports used by legitimate applications, in fact 2222 has been known to be a BackDoor trojan: Speedguide.net has some information. This machine has to be investigated for malicious software.
This is the reason for the Alpha scan – so that unknown ports running on your machines will be uncovered.
As Forbes article discusses:
Update your plugins and widgets when they are vulnerable, use complex passwords, and otherwise use good security methodologies.
It is the basics that people are not doing. What is easy to use makes it less secure, thus requiring more effort by the user or administrator to make sure it is secure and safe.
I know this is an old attack (from April 13th, 2013) but the basic principles apply, as security methods never go out of style, and old attacks come around again and again.
Contact Us to discuss.