[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1107600546.1639.2.camel@bobby.exaprobe.com>
Date: Sat, 05 Feb 2005 11:49:06 +0100
From: Nicolas Gregoire <ngregoire@...probe.com>
To: bugtraq@...urityfocus.com
Subject: Re: Input Validation Vulnerability in Apple Safari version 1.2.4
v125.12
Le vendredi 04 février 2005 à 06:10 -0600, Jonathan Rockway a écrit :
> https://tigger.uic.edu/htbin/perlwrap-auth/jrockw2/safari_test.pl
An other test page is located here :
http://nicob.net/cgi-bin/content-type.cgi
> The security problem is that servers serving HTML may be taking
> measures to prevent XSS attacks; i.e. they convert < to <. These
> servers, when serving plain text, may not do this (because it is
> unnecessary and undesirable)
Some Oracle webapps are doing exactly that : sending content with a
text/html content-type and not bothering to escape HTML or JavaScript
tags.
--
Nicolas Gregoire ----- Consultant en Sécurité des Systèmes d'Information
ngregoire@...probe.com ------[ ExaProbe ]------ http://www.exaprobe.com/
PGP KeyID:CA61B44F FingerPrint:1CC647FF1A55664BA2D2AFDACA6A21DACA61B44F
Powered by blists - more mailing lists