There's such a wealth of new XSS vectors coming out of the work on phpids that I couldn't resist sharing a few of the tastier morsels here. The original thread is over at sla.ckers if you want to read it there!
There's such a wealth of new XSS vectors coming out of the work on phpids that I couldn't resist sharing a few of the tastier morsels here. The original thread is over at sla.ckers if you want to read it there!
This is a well known trick that I just wanted to share as it is so crucial in preventing effective XSS attacks in Internet Explorer (and hopefully soon FireFox). Anyway, the method is simple, whack this under the <system.web> section of your web.config file: {% highlight xml %} {% endhighlight %} Tada! HttpOnly cookies in .NET 2.0 was originally published by Martin Paul Eve at Martin Paul Eve on June 26, 2007.
Just a quick note to announce the release of .NETIDS v.0.1.1.0 - a small update that adds some valuable features: Fixed bug of empty Report.Tags object Added options to SecurePage to disable each type of scanning Updated filters Most significantly this means that you can control whether page Output Scanning is performed from a SecurePage derived page.
One of the questions I see most frequently on Freenode's ##csharp irc channel is how to use a MySql Database in .NET. I've therefore provided the class that I use for basic database operations.
DataExecutor.cs: {% highlight csharp %} // // DataExecutor.cs // // Authors: // Martin Eve (martin@2bitpie.net) // // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, // EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND // NONINFRINGEMENT.
After much testing/tweaking the first release of .NETIDS is upon us! Featured in this release: automatic String.fromCharcode conversion and detection new and optimized filter rules improved halfwidth/fullwidth encoding detection enhanced UTF7 converter enhanced nullbyte detection page output/fragmented XSS scanning .NETIDS .NETIDS v.0.1.0.0 released was originally published by Martin Paul Eve at Martin Paul Eve on June 19, 2007.
I was interested to see in a XSS/CSRF exploit the following lines: {% highlight php %} if(preg_match("/ipb_admin_session_id=([0-9a-z]{32});/",$data,$stuff)) { print ''; } {% endhighlight %} This is obviously designed to be included in a PHP script which should then be included as part of a XSS attack and causes a CSRF attack on IPB to promote a user to administrator status.
Today I made some large commits to the .NETIDS project to enable detection of fragmented XSS attacks. For an example of what a fragmented attacks looks like, have a look at the .NETIDS SmokeTest.
Following on from a post on sla.ckers it emerges that Firefox has a vulnerability/bug that is very difficult to filter against and allows a fragmented XSS attack. This is best illustrated by the following example: {% highlight html %} link {% endhighlight %} The conditions for the XSS working are 2 injection points. Injection point 1 must be inside an HTML comment whilst injection point 2 is inside a double quoted attributed.
Today there were 5 flaws for Firefox and IE6/7 unveiled - 2 for IE and 3 for Firefox. Michal Zalewski disclosed 3 at http://seclists.org/fulldisclosure/2007/Jun/0026.html and the other can be found at http://larholm.com/2007/06/04/unpatched-input-validation-flaw-in-firefox-2004/. A bad day for browsers was originally published by Martin Paul Eve at Martin Paul Eve on June 05, 2007.
Just a quick note to announce the start of dotnetids, a port of phpids to the .NET Framework. http://code.google.com/p/dotnetids/ dotnetids was originally published by Martin Paul Eve at Martin Paul Eve on May 25, 2007.