On 02/16/2012 07:54 PM, Andres Riancho wrote:
> <RANDOM><>"'(); and find the same string in the response, that doesn't
> confirm a XSS (there might be a filter that removes the inputs with
> "script" in it)
That may be true, but if input can break HTML context - it's a
vulnerability. Actually finding
an XSS is the next step - exploitation of said vulnerability. I think a
better scheme would be to
first discover the vulnerability with a minimum of probes then go to 
the second stage where
 a lot of requests can be staged (better to massively bombard 1% of all
functions than to medium
assault 95% :)).


>> Another suggestion is to try determine context of echoed back string:
>> html (including attributes), js, css and so on [1]. Good illustration
>> of such behavior is RatProxy [2]
The stuff I was working on earlier is better described here :
http://sourceforge.net/mailarchive/message.php?msg_id=24638992
Looking at the ratproxy code, I see that it does a somewhat similar
thing (but probably with more cleverness). It tries to determine the
html context of the injection. I think the XSS plugin should do those
steps as a preliminary, then move on to exploitaition (which I never
implemented in my final version :
http://sourceforge.net/mailarchive/message.php?msg_id=24682898 ) .

Cheers,
Martin


>     RatProxy's code is crazy, reading through it give me nightmares ;)
> Just read through the XSS context detection [0] and I have some
> concerns about how well that would work in real scenarios. What I was
> trying to do in my code is:
>
>     * Send the payload
>     * Get the HTML response DOM
>     * Iterate through the DOM items and verify (based on the DOM
> objects) where I get the string echoed back
>
>     I was just working on that last week, there are some issues with
> the code I was working on so I simply left it in my local box. I'll
> work some more today and send it in this email thread.
>
> [0] http://code.google.com/p/ratproxy/source/browse/trunk/ratproxy.c#428
>
>> [0]
>> http://w3af.svn.sourceforge.net/viewvc/w3af/trunk/plugins/audit/xss.py?view=markup
>> [1]
>> https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet
>> [2] http://code.google.com/p/ratproxy/source/browse/trunk/ratproxy.c
>>
>> --
>> Taras
>> http://oxdef.info
>>
>> ------------------------------------------------------------------------------
>> Virtualization & Cloud Management Using Capacity Planning
>> Cloud computing makes use of virtualization - but cloud computing
>> also focuses on allowing computing to be delivered as a service.
>> http://www.accelacomm.com/jaw/sfnl/114/51521223/
>> _______________________________________________
>> W3af-develop mailing list
>> W3af-develop@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/w3af-develop
>
>


------------------------------------------------------------------------------
Virtualization & Cloud Management Using Capacity Planning
Cloud computing makes use of virtualization - but cloud computing 
also focuses on allowing computing to be delivered as a service.
http://www.accelacomm.com/jaw/sfnl/114/51521223/
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to