Skip to content

innerHTML based XSS in Nette #1496

@soaj1664

Description

@soaj1664

Hi,

Nette is vulnerable to an innerHTML based XSS. IE8 treats back tick character as a valid separator for attribute and value. Attacker can use back tick in order to break the attribute context and execute JavaScript.

On a test-bed: http://hoola.cz/nette-xss-test/?do=form-submit (you guys have created this test-bed in this issue: #1301)

output reflects in different context and one of them is an attribute context. In test-bed, input lands as a value of class attribute.

Now if you will input ``onmouseover=alert(1), Nette does not escape back-tick as can be seen in the output.

I am attaching a screen-shot that shows this is a valid vector in IE8.
inn1

For testing innerHTML based XSS, I have used this tool: http://html5sec.org/innerhtml/ created by Mario Heiderich.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions