Introduction

    The Cross-Site Scripting Framework (XSSF) is a security tool designed to turn the XSS vulnerability exploitation task into a much easier work. The XSSF project aims to demonstrate the real dangers of XSS vulnerabilities, vulgarizing their exploitation. This project is created solely for education, penetration testing and lawful research purposes.

    XSSF allows creating a communication channel with the targeted browser (from a XSS vulnerability) in order to perform further attacks. Users are free to select existing modules (a module = an attack) in order to target specific browsers.

    XSSF provides a powerfull documented API, which facilitates development of modules and attacks. In addition, its integration into the Metasploit Framework allows users to launch MSF browser based exploit easilly from an XSS vulnerability.

    In addition, an interesting though exploiting an XSS inside a victim's browser could be to browse website on attacker's browser, using the connected victim's session. In most of cases, simply stealing the victim cookie will be sufficient to realize this action. But in minority of cases (intranets, network tools portals ...), cookie won't be useful for an external attacker. That's why XSSF Tunnel was created to help the attacker browsing on affected domain using the victim's session.

XSSF has being tested on following browsers (with default installs):
  • Mozilla Firefox ≥ 2
  • Google Chrome ≥ 5
  • Microsoft Internet Explorer ≥ 6
  • Apple Safari ≥ 3
  • Opera ≥ 9
  • Android Browser (≥ 2.1)

NOTE: Feel free to send your comments or give your opinion to improve the XSS Framework at ludovic.courgnaud /at\ gmail.com.
XSSF new modules can be sent to the same address. Don't forget to fill your name in the module initialization author field and / or the original discoverer name.

IMPORTANT: XSSF goal is to exploit XSS vulnerabilities. The project doesn't include XSS vulnerability finder and won't include one in the future! In addition - as a project in development - XSSF still doesn't support some cases, especially regarding the use of the XSSF tunnel with an XSS over HTTPS domain (IE). Finally, XSSF is designed to be fully compatible with the last MSF version. It is possible that XSSF returns errors with non-updated versions.

ABOUT: XSSF v2.0 - Ludovic Courgnaud - CONIX Security