hello-dolly
, your URL would be http://scrumy.com/hello-dolly/
Here's the sad part... they almost got their filtering right. When written into the HTML, they correctly encoded used HTML entities and when written into URLs, they correctly URI encoded the data. They even did this for URIs that were written into JavaScript variables.
Where they didn't encode, was a JavaScript variable not used in any of these contexts. A small part of their JavaScript for the hello-dolly example reads like this:
window.projectName="hello-dolly";Change the URL to
http://scrumy.com/%22%3balert(0)%3b%22
and this is what gets written into the page:window.projectName="";alert(0);"";Resulting in an XSS.
Now I only looked at a single page on the site, so can't comment on whether there are more holes or not.
I emailed them as soon as I found the bug and a few hours later it was fixed. Good job folks!
0 comments :
Post a Comment