Hi,

I recently noticed (though they are a couple of months old - so maybe
this has already been added to w3af?) these vulnerabilities which
potentially is quite common on PHP :
http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.html

Basically, PHP which relies on a filter (such as addslashes,
htmlentities, escapeshellarg, etc.) will NOT be able to detect&escape
byte sequences on its non-shortest form, and so an application that
relies on them for security checks wont be protected at all. Therefore,
xss can be achieved in a number of extra ways, for example by

< = %3c = %c0%bc = %e0%80%bc = %f0%80%80%bc

It would be easy for w3af to detect this. Perhaps not directly in the
xss-module, but an injection-module which tries combinations and
characters that can be output on the page and runs before the
xss-module. Such a module could also check if a character is
double-decoded onto the page and basically produce a map of wanted
output-> input. So that M("<") = "%F0%80%80%bc or M("<")="%253C".

Having this in a separate module, or at least separate in the knowledge
base could be good, since it is often possible to perform xss even if
the xss-module does not find any fitting vector (in my experience,
manual fixing is often needed). Apologies if this is already
implemented, it was a few months since I checked the source-code.

Regards,
Martin Holst Swende


------------------------------------------------------------------------------
This SF.Net email is sponsored by the Verizon Developer Community
Take advantage of Verizon's best-in-class app development support
A streamlined, 14 day to market process makes app distribution fast and easy
Join now and get one step closer to millions of Verizon customers
http://p.sf.net/sfu/verizon-dev2dev 
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to