Closed Bug 826915 Opened 12 years ago Closed 12 years ago

Code example "showModalDialogBox" vulnerable to XSS with certain input

Categories

(developer.mozilla.org :: Security, defect)

defect
Not set
normal

Tracking

(Not tracked)

RESOLVED DUPLICATE of bug 827398

People

(Reporter: openjck, Unassigned)

Details

(Whiteboard: [site:developer.mozilla.org])

Quoting :curtisk from bug 769757. > http://developer.mozilla.org/samples/domref/showModalDialogBox.html > Vuln Code: > > <script> > document.write("Modal dialog got argument: " + window.dialogArguments); > </script> > > The page get arguments using "window.dialogArguments" and write it to the > Page without HtmlEncoding. > fix: use escape function \ other html encoding mechanism.
Status: NEW → RESOLVED
Closed: 12 years ago
Resolution: --- → DUPLICATE
Whiteboard: [site:developer.mozilla.org]
For bugs that are resolved, we remove the security flag. These haven't had their flag removed, so I'm removing it now.
Group: websites-security
You need to log in before you can comment on or make changes to this bug.