Page 1 of 1

anehta from axis - does NoScript protect?

Posted: Mon Jul 27, 2009 3:46 pm
by luntrus
Hi forum members,

Look at the following malcode analysis:
Here are the details I encountered:

1. Virus identified: JS-CVE-2009-1136-A[Expl] (which is an Exploit)
2. Web address:
3. Malicious file identified by Avast!:

Mentioned site with this document.js is the malcode residing site:

Code: Select all

[EDITED by me for security reasons and against scanner detection]^^script src="htxtp://"^^/script 

And this is:
HTTP Error 403 Forbidden
URL: hXtp://
Redirects: 301 -> hXtp://
where I find the following:

Code: Select all

 [again EDITED by me]
^a href="anehta-v0.6.0fixed/" anehta-v0.6.0fixed/^/a></li

And this is at the crux of the malcode, because Description (packet storm's):
Anehta is a PHP/Javascript based platform to make cross site scripting and other web attacks easier.
Author: axis
Homepage: hXtp://
File Size: 5596731
Last Modified: Nov 25 17:46:32 2008
MD5 Checksum: 5316c6cb785caef595c58e80a97f4ce8
More info on this new XSS platform: ... /0565.html
other redirect is to:
302 -> hXtp://

Is NoScript protecting us against anehta driven exploits?


Re: anehta from axis - does NoScript protect?

Posted: Tue Jul 28, 2009 12:39 am
by therube
First, when you visit uyghurcongress (presumably) JavaScript is not allowed, so the exploit is thwarted right there.

Code: Select all

<script src=""></script>

Second, even if you do Allow JavaScript on uyghurcongress, the exploit is still hosted on a foreign domain, so again the exploit is thwarted.

Third, the exploit page itself doesn't seem to be returning anything at the moment.
(I wonder if it might only do something if you're visiting from a .cn domain?)

Code: Select all

Secur1ty just lik3 a grl. B0th of th3m h4ve s0me h0les. Y0u alw4ys try to f1nd the h0le, but n0t 3very tim3 y0u c4n 3xpl0it it!