[Webkit-unassigned] [Bug 29523] New: [XSSAuditor] JavaScript URLs that are URL-encoded twice can by bypass the XSSAuditor
bugzilla-daemon at webkit.org
bugzilla-daemon at webkit.org
Sat Sep 19 14:50:49 PDT 2009
https://bugs.webkit.org/show_bug.cgi?id=29523
Summary: [XSSAuditor] JavaScript URLs that are URL-encoded
twice can by bypass the XSSAuditor
Product: WebKit
Version: 528+ (Nightly build)
Platform: All
URL: http://eaea.sirdarckcat.net/xss.php?html_xss=<iframe+s
rc="javascript:'1%25251';alert(document.domain)">
OS/Version: All
Status: NEW
Keywords: XSSAuditor
Severity: Normal
Priority: P2
Component: WebCore Misc.
AssignedTo: webkit-unassigned at lists.webkit.org
ReportedBy: dbates at webkit.org
CC: mario.heiderich at gmail.com, sam at webkit.org,
abarth at webkit.org
Blocks: 29278
The method FrameLoader::executeIfJavaScriptURL decodes the URL escape sequences
in a JavaScript URL before it is eventually passed to the XSSAuditor. Because
the XSSAuditor also decodes the URL escape sequences as part of its
canonicalization, the double decoding of a JavaScript URL would not match the
canonicalization of the input parameters.
--
Configure bugmail: https://bugs.webkit.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
More information about the webkit-unassigned
mailing list