Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cross-site script execution #642

Closed
dhayarkn opened this issue May 4, 2016 · 0 comments
Closed

Cross-site script execution #642

dhayarkn opened this issue May 4, 2016 · 0 comments

Comments

@dhayarkn
Copy link

dhayarkn commented May 4, 2016

This plug-in allows executing cross-site scripts if the source element has encoded html content. Plug-in code constructs label and input elements using string concatenation which allows executing third party html content as part of the plug-in. For example, applying this plug-in on the following html element will execute the encoded html content assigned to the value property of the option tag.

Code snippet:
<select name="test" id="test"> <option value="&#39;&quot;&gt;&lt;svg/onload=(new(Image)).src=&#39;//1lns7eap1hvfd4ms6l8a4sy15sbnzfp3hqie7\56burpcollaborator.net&#39;&gt;" title="&#39;&quot;&gt;&lt;svg/onload=(new(Image)).src=&#39;//1lns7eap1hvfd4ms6l8a4sy15sbnzfp3hqie7\56burpcollaborator.net&#39;&gt;"> &#39;&quot;&gt;&lt;svg/onload=(new( </option> </select>

@mlh758 mlh758 closed this as completed in 32c104c Jul 22, 2016
mlh758 added a commit that referenced this issue Jul 22, 2016
Fix #642 Rewriting refresh method to avoid vulnerable string concatenation.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant