Dne 15.3.2010 11:02, Klaus Kaempf napsal(a):
[...]
> ALL: Break your colleagues module, enter random data into input
> fields, click around like crazy, etc.
One more test case:
Try entering HTML tags into text fields, check whether the input is properly
escaped when printed, or enter a JavaScript input like
<script type="text/javascript">alert("XSS attack!")</script>
If a popup is displayed after loading the page than there is
a serious XSS vulnerability!
(Solution: use h() helper in views for escaping all user entered values
or values read from a potentially unsafe source (which is almost everything),
see http://api.rubyonrails.org/classes/ERB/Util.html#M000315)
I just have reported bnc#588443 (users module), but I'm pretty sure
that there are more places...
--
Best Regards
Ladislav Slezák
Yast Developer
------------------------------------------------------------------------
SUSE LINUX, s.r.o. e-mail: [email protected]
Lihovarská 1060/12 tel: +420 284 028 960
190 00 Prague 9 fax: +420 284 028 951
Czech Republic http://www.suse.cz/
--
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]