Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
Q and A for any cross site scripting information. Feel free to ask away. 

Current Page: 1 of 1
Results 1 - 16 of 16
3 years ago
mikefree
What characters are required after a "<"-character in order to be parsed as tag by the browser? I found the following scenario: 1. "<" followed by a blank + arbitrary data 2. "<" followed by a <br /> + arbitrary data 3. "<" followed by &nbsp; + arbitrary data 4. "<" followed by %0B + arbitrary data 5. "<
Forum: XSS Info
3 years ago
mikefree
..forgot to mention: I'm aware of various attacks where js is executed once the user clicks the link. However since there are so few restrictions maybe more is possible?
Forum: XSS Info
3 years ago
mikefree
Hi guys, in this scenario arbitrary data can be injected in an HREF attribute of a link. The only restrictions are: 1. " gets encoded to &quot; 2. < and > get removed is it possible to break out of the href attribute and do "onRollover-stuff" or is it even possible to execute javascript without any user interaction? You can test the scenario here: http://testit
Forum: XSS Info
4 years ago
mikefree
It definitly freaks me out how much stuff is possible outside the "regular" HTML syntax..
Forum: XSS Info
4 years ago
mikefree
Well, Thanks alot Sirdarckcat and lightos... I guess there is still a lot to learn out there for me in regard to xss Vektors.. Greetings Mike!
Forum: XSS Info
4 years ago
mikefree
Smoketest added here: Feel free to try! Thanks for feedback!
Forum: XSS Info
4 years ago
mikefree
Hey ,mario I should have been a little more specific... since no attributes are allowed, all "blanks" within a Tag are recognized as a possible attack. Therefore tags with blanks get deleted immediatly. Right now I'm working on a test version. I post it up later
Forum: XSS Info
4 years ago
mikefree
That makes one new follower ;-)
Forum: XSS Info
4 years ago
mikefree
@ .mario @ sirdarckcat I totally forgot about <style>! Thats definatly an attack vektor. thanks for the reply.
Forum: XSS Info
4 years ago
mikefree
Yeah, an URI would be great! greetings Mike!
Forum: XSS Info
4 years ago
mikefree
Hi rvdh, href or src are not allowed since they are attributes. Is it still possible to XSS the scenario? I can't think of any one Thanks Mike
Forum: XSS Info
4 years ago
mikefree
hi Nytro, The scenario described above is just a theoretical scenario. You don't have to worry about users posting images. I just want to know if you guys know a way to inject XSS in the scenario described above Thx Mike
Forum: XSS Info
4 years ago
mikefree
Hi guys.. ## EDIT ### Smoketest added here: http://testittt.110mb.com/tagparser.php Feel free to try! Thanks for feedback! ## EDIT ### Right now I'm thinking about the following scenario: All users are allowed to post any html-tag they want.. minus the folowwing exceptions: - <script> </script> (upper or lower caser doesnt matter) - NO attributes are allowed - A
Forum: XSS Info
4 years ago
mikefree
Hi .Mario Right now I don't use the utf8_decode()-Function afterwards. However I have the following Meta-Tag in place <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /> Could you please explain the effect of the Function a little more? Why is it important? Thx Mike!
Forum: XSS Info
4 years ago
mikefree
Hi guys, On my website arbitrary userinput gets stored in a database. The userinput is later put on the website in between <body> tags. I'm using the php-function "htmlspecialchars()" to protect against xss Is there any way to circumvent the function or am I save?? Thanks Mike!
Forum: XSS Info
Current Page: 1 of 1