Forum

XSS

Samiux
14 September 2011, 17:13

Hiawatha version: 7.6
Operating System: Ubuntu Server 11.04

I think it is not a bug in general. I found that the following XSS codes are bypassed :

<sCrIpT>alert("XSS")</ScRiPt>

and

<meta http-equiv="refresh" content="0; URL=http://some.domain.com"/>

For your information, please.

Samiux

Hugo Leisink
14 September 2011, 21:45
The XSS prevention works only for XSS in the URL. Did you use that alert() in an URL?

I've never seen a website that allows a use to insert HTML headers. So, I don't consider the meta tag example as a realistic threat.
Samiux
15 September 2011, 04:55
Hi Hugo,

I insert the captioned command inside an input field such as message box.

Samiux
Samiux
15 September 2011, 04:58
Hi Hugo,

Forgot to include a youtube. The technique is using meta tag. Here you are :

http://samiux.blogspot.com/2011/09/howto-deface-website-fast.html

Samiux
Hugo Leisink
15 September 2011, 20:56
The meta tag in a POST request is something you can block with the DenyBody option.
Samiux
16 September 2011, 04:53
Hi Hugo,

Please take a while to visit this site :

http://forum.intern0t.net/web-hacking-war-games/3412-bypassing-cross-site-scripting-filters.html

Samiux
Samiux
16 September 2011, 04:58
Hi Hugo,

How to do that for more than one DenyBody? And how to do that with the captioned meta tag?

Samiux
Samiux
17 September 2011, 02:33
Hi Hugo,

The captioned questions have been solved. Thanks for your great and powerful software.

Samiux
This topic has been closed.