Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add pattern #62

Closed
hahwul opened this issue Feb 25, 2020 · 2 comments
Closed

Add pattern #62

hahwul opened this issue Feb 25, 2020 · 2 comments
Labels

Comments

@hahwul
Copy link
Owner

hahwul commented Feb 25, 2020

from nil

jav    ascript:alert(1)'

[ Html Entity(&name) ]

javascript:alert(1)

[ Html Code(&#) ]

javascript:alert(1)
javascript&#0000058alert(1)
 javascript:alert(1);

[ Hex Code(&#X) ]

javascript:alert(1)
&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29'

여기서 검증할만한 것들만 추리자. 다만 event handler, 각종 src, href에 들어가는걸 걸러내서 탐지하지 않는 이상 오탐이 엄청 많을거임..

@hahwul hahwul added the plan label Feb 25, 2020
@hahwul
Copy link
Owner Author

hahwul commented Feb 25, 2020

  • 그나마 태그 제한이 적은 <a href=''> 범용적인 <iframe src=''> 에 직접 넣어서 테스트해볼 순 있음
  • 풀려서 들어가는냐, 그냥 들어가느냐도 걸러야함..
  • CallbackStringMatch 로 하는게 부담이 적을듯(셀레니움이 들어가면..)

우선은 a 태그 기준으로 넣어놓고, 각각 인코딩 방법에서 디코딩되서 노출되는지는 파라미터 분석에서 처리하자

@hahwul
Copy link
Owner Author

hahwul commented Feb 25, 2020

각각 reflection은 #60 여기서

@hahwul hahwul closed this as completed in cb3b70a Feb 25, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant