Re: <BASE> tag used for hijacking external resources (XSS)

看板Bugtraq作者時間14年前 (2011/12/17 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/7 (看更多)
2011/12/15 Bouke van Laethem <vanlaethem@gmail.com>: > ISSUE: > The <base> tag is parsed outside of <head></head>. This can lead to > the base being reset, both before and after the <base> tag being > injected, depending on browser types and versions. As a result, images > and javascript can be loaded from an attackers domain, and forms and > hyperlinks point to the attackers domain. Erm... so you're basically assumint that the attacker can inject stuff into the page? If that's the case, you should have other issues than your links getting altered or so, no? E.g. what about javascript injection?
文章代碼(AID): #1EwuTW22 (Bugtraq)
討論串 (同標題文章)
文章代碼(AID): #1EwuTW22 (Bugtraq)