-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SanitizeCSS is bypassable #2
Comments
Thanks for the report, I'll attend to it :) Henrik |
@henrikau May I suggest a better and unbreakable solution for CSS or style context if you would like :) |
On Tue, Jul 08, 2014 at 03:29:07AM -0700, Ashar Javed wrote:
Hi, You are more than welcome to provide a patch and if it looks sane I'm than Also; github is moreof a backup-site, assembla [1] is the main repository
Henrik Austad |
@henrikau Here you go: https://gist.github.com/soaj1664/2aab2c9ae51cf433aed3 It is very simple but bullet proof :) No one can execute JavaScript in style context if that function is in use. Some weeks ago I had announced a 1000USD XSS challenge and had recorded 78K+ XSS attack attempts and no bypass in any context ... see http://demo.chm-software.com/7fc785c6bd26b49d7a7698a7518a73ed/ Let me know when you will integrate this function ... or as per your requirement you can easily modify it ... |
@henrikau I am waiting for your reply. What is your take on it after looking at the code ... |
I'm currently on holiday without access to my systems. Please send a patch Henrik
|
@henrikau I will wait until next week so that you will be back :) Enjoy your vacations ... |
@henrikau Hi again. I hope you are back from vacations :) Looking forward for the patch... |
@henrikau Any update? Are you planning to integrate the code or leave the idea? Thanks! |
Fixed in Confusa 0.8.6. |
@thijskh Great ... |
Hi,
The function
confusa/lib/misc/input.php
Line 78 in 9e32af0
e.g., the following attack vector will bypass it ..
width:expression(alert(1))
The regular expression only looks for word
URL
and small parenthesis ...Thanks!
The text was updated successfully, but these errors were encountered: