Penetration Testing mailing list archives
Re: CSS dangers with XSS?
From: dork () gmx at
Date: Wed, 15 Mar 2006 03:09:58 +0100
hi! if you just mean further requests that could be triggered, there would be the IE specific filter:... src='http://example.com/...' but if you mean anything like css triggered javascript, afaik behavior:url(javascript.htc) is the most dangerous, but uses url() and is restricted, especially under newer ie/xp sp2 combinations (and does only work under internet explorer anyway) do not forget about quotes in general to avoid event handler registration. if you display custom input within attributes (such as href), you should consider opt-in instead of opt-out filtering. there are always new browser features or possibilities like <a href="http://example.com%2F redir=test.com">. pedantic rule of thumb: if there is an rfc or any other standard limiting allowed chars to a specific encoding, a given range of possible values or a specific type, you generally do not have to allow anything different. an exception could be some vendor specific *extension*. if you use a provided string in an output, that normally would need a special encoding, treat it like this, regardless of the kind of usage you planned. hth, if i didn't get your question wrong. On Monday 13 March 2006 22:04, offset wrote:
Hello fellow pen-testers.
Trying to increase my test data for XSS.
Anyone know of any other CSS dangerous tags other than url() that could be
used to bypass XSS filters that filter out the typical <>%{}\[] etc?
Thanks in advance,
------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------
Current thread:
- CSS dangers with XSS? offset (Mar 13)
- Re: CSS dangers with XSS? dork (Mar 14)
