Closed
Bug 1267067
Opened 9 years ago
Closed 9 years ago
firefox xss bypass
Categories
(Firefox :: Untriaged, defect)
Tracking
()
RESOLVED
INVALID
People
(Reporter: xiaopigfly, Unassigned)
Details
(Whiteboard: firefox xss bypass)
Attachments
(1 file)
|
114.22 KB,
application/vnd.openxmlformats-officedocument.wordprocessingml.document
|
Details |
User Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
Steps to reproduce:
Test Methods
Consider the following web script:
<?php
header("Content-Type: text/html; charset=utf-8");
echo $_GET[c];
?>
If the routine conduct XSS such as:
.php?c=<script>alert()</script>
Security policy to block, but if you submit
.php?c=%c1<script>alert()</script>
Firefox code can bypass the xss filter and executed.
Actual results:
alert(document.domain)
Expected results:
alert(document.domain)
| Reporter | ||
Updated•9 years ago
|
OS: Unspecified → Windows 7
Hardware: Unspecified → x86
Whiteboard: firefox xss bypass
Comment 1•9 years ago
|
||
Firefox has not implemented a Reflected XSS filter. It's an incomplete solution at best and we urge sites to adopt a strict Content-Security-Policy instead.
Group: firefox-core-security
Status: UNCONFIRMED → RESOLVED
Closed: 9 years ago
Resolution: --- → INVALID
You need to log in
before you can comment on or make changes to this bug.
Description
•