[13244] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Hotmail security hole - injecting JavaScript using

daemon@ATHENA.MIT.EDU (Metal Hurlant)
Wed Jan 5 14:30:21 2000

Content-Type: text/plain
Mime-Version: 1.0
Content-Transfer-Encoding: 8bit
Message-Id:  <0001051148390B.00475@jameson.paris.yahoo.com>
Date:         Wed, 5 Jan 2000 11:37:49 +0100
Reply-To: Metal Hurlant <metal_hurlant@YAHOO.COM>
From: Metal Hurlant <metal_hurlant@YAHOO.COM>
X-To:         BUGTRAQ@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM

On Tue, 04 Jan 2000, Kevin Hecht wrote:
> While Hotmail obviously has a filtering hole, should the browser
> manufacturers be on the hook here as well, given that javascript: URLs
> probably shouldn't be rendered at all by the <IMG> tag? While a
> JavaScript script may load an image on its own, I don't see why the
> script itself should be loaded and parsed from an <IMG> tag.

Netscape actually tries to parse the value returned by the script, so if your
script returns, for example, a valid XPM string, you'll get that image
displayed.

What could be useful would be a tag working like
<blockscript key=randompieceofdata>

</blockscript key=samepieceofdata>

anything between these tags would still get parsed as HTML, but with no script
hook working.
That way, filtering scripts out of untrusted HTML would become the browser
manufacturers responbility, and things would be a lot easier for everyone else.

Just dreaming,
Henri Torgemane

home help back first fref pref prev next nref lref last post