The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#1
|
||||
|
||||
![]()
I'm currently working for a client, and one this project they want users to be able to use HTML, but ofcourse i don't want them to be able to do some 'dodgy' stuff, so i created a little test engine to remove every trick i know in the book about injecting javascript into systems that allow HTML to be used, but not JS.
http://www.gzevolution.net/self.php I was wondering if anyone here can get ANY js to execute on that page, and if you can, what html code did you input? Yes, the client knows this is a bad thing, but he won't take no for an answer, so all help is appreciated, i don't want to leave security hole's in the system. Thanks people, - Zero Tolerance |
#2
|
||||
|
||||
![]()
Just talking about javascript (for example: "Javascript is great!") replaces it with "Active Scripting Disabled".
|
#3
|
||||
|
||||
![]()
Hmmm it doesn't block flash and I guess if I wanted to, I could probably que a flash script to load up some javascript.
I used: Code:
<embed src=http://www.nytalk.net/delete/thetomblack.swf width=500 height=100</embed> |
#4
|
||||
|
||||
![]()
@ Link - Yeah for now, it will be more specific later
@ Reeve of shinra - Yeah, i forgot to add that to the list of bad tags, i also need to block the link tag, because you can inject javascript into the css import. Thanks for the feedback guys, appreciated ![]() - Zero Tolerance |
#5
|
|||
|
|||
![]() HTML Code:
<a onmouseover="alert('foo')">link</a> HTML Code:
<a ert('foo')>link</a> |
#6
|
|||
|
|||
![]()
I can't figure out anything to get past it, but if I see the source code, I might think of something.
|
#7
|
||||
|
||||
![]()
filburt1 - Yeah parsing it properly out is not a concern, in the end it will just check for invalid entries and throw an error then stopping the data from saving, so people know they can't use nasty stuff, and because it will save a lot of processing time instead of trying to strip out some guys billion injection attempts everytime the page with the data is loaded.
Here's the source for the file: PHP Code:
![]() - Zero Tolerance |
#8
|
|||
|
|||
![]()
BTW, shorthand for initializing an array, for example:
PHP Code:
|
#9
|
||||
|
||||
![]() Quote:
![]() So seeing the source gave you no other ideas? - Zero Tolerance |
#10
|
|||
|
|||
![]()
It looks effective at first glance, but it makes assumptions on HTML that could change at any time.
|
![]() |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|