[Webkit-unassigned] [Bug 27405] New: [XSSAuditor] URL encoded ampersand can be used to bypass XSSAuditor

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Fri Jul 17 22:52:46 PDT 2009


https://bugs.webkit.org/show_bug.cgi?id=27405

           Summary: [XSSAuditor] URL encoded ampersand can be used to
                    bypass XSSAuditor
           Product: WebKit
           Version: 528+ (Nightly build)
          Platform: All
               URL: http://webblaze.org/dbates/xsstest.php?q=<a
                    href='about:blank' onclick=alert('%26q')>Test</a>
        OS/Version: All
            Status: NEW
          Keywords: XSSAuditor
          Severity: Normal
          Priority: P2
         Component: WebKit Misc.
        AssignedTo: webkit-unassigned at lists.webkit.org
        ReportedBy: dbates at berkeley.edu
                CC: sam at webkit.org, abarth at webkit.org


When decoding HTML entities (XSSAuditor::decodeHTMLEntities), the ampersand is
removed and the supposed entity is consumed. If the entity turns out to be
invalid, such as an unknown named entity, then a null-character is inserted
into the decoded result, which creates a discrepancy between the script code
and the HTTP parameters.

Consider:

Inline Event Handler:
http://webblaze.org/dbates/xsstest.php?q=%3Ca%20href='http://www.webblaze.org'%20onclick='alert(/%26XSS/)'%3EClick%3C/a%3E

JavaScript Link:
http://webblaze.org/dbates/xsstest.php?q=%3Ca%20href=javascript:alert(/%26XSS/)%3EClick%3C/a%3E

-- 
Configure bugmail: https://bugs.webkit.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.



More information about the webkit-unassigned mailing list