Nytro Posted December 4, 2011 Report Posted December 4, 2011 Cross Context Scripting with FirefoxRoberto Suggi LiveraniSenior Security ConsultantSecurity-Assessment.com21 April 2010ContentsAbstract ............................................................................................................................ 31. Introduction .................................................................................................................. 41.1 XPCOM Component Model ........................................................................................ 41.2 XUL ............................................................................................................................ 41.3 Chrome ....................................................................................................................... 51.4 XBL - Custom tags........................................................................................................ 51.5 XUL Overlay ................................................................................................................ 51.6 Themes, Skins and Locales ........................................................................................... 52. XCS Cases .................................................................................................................. 62.1 Case I: XCS via Event Handlers – Drag and Drop ............................................................. 62.2 Case II: Attacking Custom DOM event handlers................................................................ 82.3 Case III: Cross Domain Content/Script Include ............................................................... 102.4 Case IV: Injection via XBL ........................................................................................... 122.5 Case V: Attacking Wrappers ........................................................................................ 142.6 Case VI: Attacking XPCOM Components....................................................................... 152.7 Case VII: Sandbox Chrome Leakage ............................................................................ 182.8 Case VIII: Bypassing nsIScriptableUnescapeHTML.parseFragment() ................................ 193. Conclusion ................................................................................................................. 214. References ................................................................................................................ 22Download:http://security-assessment.com/files/documents/whitepapers/Cross_Context_Scripting_with_Firefox.pdfhttp://security-assessment.com/files/documents/whitepapers/Exploiting_Cross_Context_Scripting_vulnerabilities_in_Firefox.pdf Quote