Skip to content
This repository has been archived by the owner on May 14, 2020. It is now read-only.

XSS bypass with a payload not containing "<script>" #1705

Open
dune73 opened this issue Feb 28, 2020 · 0 comments
Open

XSS bypass with a payload not containing "<script>" #1705

dune73 opened this issue Feb 28, 2020 · 0 comments

Comments

@dune73
Copy link
Contributor

dune73 commented Feb 28, 2020

Description

The following request is not identified as an attack at PL1 - yet on the specific application I am lookin at, this is a successful XSS.

$> curl 'http://localhost/index.html?pa=BCDEGHKLMNPQRSTUVXYZ%26apos%3b%3balert(%27Hello%27)'

The problem is probably that it's "alert" without prior script tag. I wonder if we want to come up with a rule to detect this by default. I am a bit torn and I fear false positives.

Your Environment

  • CRS version (e.g., v3.2.0): v3.2.0
  • Paranoia level setting: PL1
  • ModSecurity version (e.g., 2.9.3): 2.9.3
  • Web Server and version (e.g., apache 2.4.41): 2.4.41
  • Operating System and version: Ubuntu

Confirmation

[X] I have removed any personal data (email addresses, IP addresses,
passwords, domain names) from any logs posted.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

1 participant