Am 16.02.2012 23:50, schrieb Andres Riancho:
> Achim,

>> escaped or removed angle braces:
>>    continue with tag or attribute injection
> 
> If and only if we're not in a TEXT (<a>TEXT</a>) section, because
> we're never going to be able to execute JS if we don't create some
> kind of new tag and are in that context. Correct?

not correct, see below

>> removed or mangled fooled tag:
>>    continue attribute injection and non-HTML injections like CSS or JS
> 
> Something similar to the above applies but I'm too tired to think ;)
> 

If you're in a TEXT section where the enclosing tag is *not*
  script, style, svg, embed, object, <!-- , or CDATA, (some more?)
you have no real XSS, just some kind of content spoofing.
I'd not qualify this as a security problem, it's worth reporting as "QA"
problem.
However, in modern web pages such TEXT may be used as data within some
javascript code, then it's important what kind of TEXT we have and how
it will be used. Think about doing something like:
    eval(document.getElementByID('stupid').innerTEXT);

(are there really developers doing such stupid things?) 

And what about data returned in JSON context? It's neither HTML nor
enclosed in tags. It even may not be simply identified as javascript, i.e:

        {'you got it'}

or DWR data like (separated by newlines):

        key=value
        otherdata

You see, TEXT may come in various flaviours. You (the tool) need to know
in which context such TEXT will be used later on.

Sorry for telling complicated stories ;-)
Achim

------------------------------------------------------------------------------
Virtualization & Cloud Management Using Capacity Planning
Cloud computing makes use of virtualization - but cloud computing 
also focuses on allowing computing to be delivered as a service.
http://www.accelacomm.com/jaw/sfnl/114/51521223/
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to