Closed
Bug 416426
Opened 18 years ago
Closed 18 years ago
XSS with the general.useragent.extra.firefox
Categories
(Firefox :: General, defect)
Tracking
()
VERIFIED
INVALID
People
(Reporter: phanter_root, Unassigned)
Details
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.12) Gecko/20080201 Phanter-RooT
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.12) Gecko/20080201 Phanter-RooT
If I change the general.useragent.extra.firefox like:
<h1>Phanter-Root
and I create a PHP code like:
<?
echo $HTTP_USER_AGENT;
?>
I execute a HTML code (<h1>Phanter-Root) in the page.
Reproducible: Always
Steps to Reproduce:
1. Go to about:config
2. Add a new chain with name: general.useragent.extra.firefox and value: CODE, example: <h1>Phanter-Root.
Actual Results:
When you enter in a web page with a code like:
echo $HTTP_USER_AGENT;
We can execute a code (Like HTML, PHP, JAVASCRIPT, and others...)
Comment 1•18 years ago
|
||
It's your PHP code that is buggy, not Firefox. You need to HTML-escape output that you intend to be shown as text.
Group: security
Summary: Code execution with the general.useragent.extra.firefox → XSS with the general.useragent.extra.firefox
Updated•18 years ago
|
Status: UNCONFIRMED → RESOLVED
Closed: 18 years ago
Resolution: --- → INVALID
| Reporter | ||
Comment 2•18 years ago
|
||
Uhmm Ok, Sorry :)
But, put a filter like don't allow >, <, ......
Comment 3•18 years ago
|
||
Why? It's not HTML.
Updated•18 years ago
|
Status: RESOLVED → VERIFIED
You need to log in
before you can comment on or make changes to this bug.
Description
•