-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update: [XSS Filter Evasion Cheat Sheet] #1395
Comments
I haven't done the tests. I'm not sure if this is accurate out but if it is, I think it's a good edit. |
When I worked at WF doing secure code reviews, unless the application under review was explicitly checking the User-Agent request header and rejecting certain browsers, we always assumed that someone, somewhere was using an ancient browser so the code had to protect against that, including any malformed markup that it would accept that could lead to an exploitable vulnerability. (In fact, there was a standing joke that someone's grandparent would pull out their old Windows XP laptop out of the closet, fire it up, and do online banking using MSIE 6. :) That said, I think that should be the working assumption here. We should note that The reason I don't think it should be deleted though is companies that are not checking UA for old browsers that accept |
Proposed an update where we still have examples of using the |
What is missing or needs to be updated?
Modern browsers generally ignore
javascript:
in<img>
src
attributes. Most of the examples listed which would execute javascript within an<img>
src
attribute no longer work, and may provide a false sense of security to development teams who are attempting to mitigate XSS while ignoring the examples which utilize<img src>
.However, the advice is still good, and almost entirely applicable if the examples are updated to
<a>
andhref
, instead.How should this be resolved?
Update any example in the cheatsheet which relies on the execution of javascript in the
src
attribute of an<img>
tag to use<a>
andhref
.The text was updated successfully, but these errors were encountered: