[WEB SECURITY] XSS filter Bypass

Daniel Herrera daherrera101 at yahoo.com
Tue May 29 12:12:14 EDT 2012


<%73cript>

--- On Thu, 5/24/12, Appsec User <pentestguy.cs at gmail.com> wrote:

> From: Appsec User <pentestguy.cs at gmail.com>
> Subject: [WEB SECURITY] XSS filter Bypass
> To: websecurity at lists.webappsec.org
> Date: Thursday, May 24, 2012, 3:16 AM
> Hi,
> 
> I am probing for XSS in an application. Application has a
> filter which
> triggers if I put anything after less than sign '<'
> except space, %
> and >. So application accepts < character but only
> allows space, % and
> > after it. So e.g < script(note space in b/w) is
> allowed but <script
> will be rejected(no space). I have tested for various
> encoding also
> <%00script is allowed but it puts space between < and
> script and
> browser does not treat it as mark up. I cannot probe for
> javascript
> events as Payloads are reflecting in HTML context not in
> javascript
> context. Any suggestions how can I by-pass this filter.
> 
> _______________________________________________
> The Web Security Mailing List
> 
> WebSecurity RSS Feed
> http://www.webappsec.org/rss/websecurity.rss
> 
> Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA
> 
> WASC on Twitter
> http://twitter.com/wascupdates
> 
> websecurity at lists.webappsec.org
> http://lists.webappsec.org/mailman/listinfo/websecurity_lists.webappsec.org
> 




More information about the websecurity mailing list