NoScript Cross Site Scripting Via SQL Injection

2010.11.30
Credit: Aditya K Sood
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

Hi List NoScript fails to detect the reflective XSS from trusted domains when an attack is conducted through SQLXSSI. The bypass in NoScript has been successfully conducted by using "Reflective XSS" through Union SQL poisoning attacks by exploiting the reverted errors in the browser. The attack string used to bypass is stated below http://www.example.com/news.php?news=12%27union%20select%201,2,3,4,5,6,7,0x3c7363726970743e616c657274282f73636861702f293c2f7363726970743e,9,10,11,12,version%28%29%20from%20tbl_news--+ The attacker can create a potential attack patterns using the above stated vector. The exploitation video has been released at SecNiche Security channel - http://www.youtube.com/watch?v=r-kgKNspqjQ Disclosure: The bug was disclosed to the author on 24th November 2010. A new version of NoScript 2.0.6 is released today (25th November 2010). Further, NoScript 2.0.6 version fails to combat against this attack vector and can be bypassed with the same. Credit - Aditya K Sood | Rohit Bansal of SecNiche Security


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top