-
-
Notifications
You must be signed in to change notification settings - Fork 230
Description
Hi,
Nette is vulnerable to an innerHTML based XSS. IE8 treats back tick character as a valid separator for attribute and value. Attacker can use back tick in order to break the attribute context and execute JavaScript.
On a test-bed: http://hoola.cz/nette-xss-test/?do=form-submit (you guys have created this test-bed in this issue: #1301)
output reflects in different context and one of them is an attribute context. In test-bed, input lands as a value of class attribute.
Now if you will input ``onmouseover=alert(1), Nette does not escape back-tick as can be seen in the output.
I am attaching a screen-shot that shows this is a valid vector in IE8.
For testing innerHTML based XSS, I have used this tool: http://html5sec.org/innerhtml/ created by Mario Heiderich.