Closed Bug 416426 Opened 18 years ago Closed 18 years ago

XSS with the general.useragent.extra.firefox

Categories

(Firefox :: General, defect)

x86
Windows XP
defect
Not set
major

Tracking

()

VERIFIED INVALID

People

(Reporter: phanter_root, Unassigned)

Details

User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.12) Gecko/20080201 Phanter-RooT Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.12) Gecko/20080201 Phanter-RooT If I change the general.useragent.extra.firefox like: <h1>Phanter-Root and I create a PHP code like: <? echo $HTTP_USER_AGENT; ?> I execute a HTML code (<h1>Phanter-Root) in the page. Reproducible: Always Steps to Reproduce: 1. Go to about:config 2. Add a new chain with name: general.useragent.extra.firefox and value: CODE, example: <h1>Phanter-Root. Actual Results: When you enter in a web page with a code like: echo $HTTP_USER_AGENT; We can execute a code (Like HTML, PHP, JAVASCRIPT, and others...)
It's your PHP code that is buggy, not Firefox. You need to HTML-escape output that you intend to be shown as text.
Group: security
Summary: Code execution with the general.useragent.extra.firefox → XSS with the general.useragent.extra.firefox
Status: UNCONFIRMED → RESOLVED
Closed: 18 years ago
Resolution: --- → INVALID
Uhmm Ok, Sorry :) But, put a filter like don't allow >, <, ......
Why? It's not HTML.
Status: RESOLVED → VERIFIED
You need to log in before you can comment on or make changes to this bug.