XSS Auditor Bypass using PHP var_export and print_r
Reported by
aravind....@gmail.com,
Sep 21 2016
|
|||
Issue descriptionVULNERABILITY DETAILS I found a security flaw that allows an attacker to bypass the xss auditor. This basically occurs due to the bad use of PHP function var_export and print_r. VERSION Chrome Version: [53.0.2785.116 (64-bit)] + [stable] Operating System: [BackboxLinux, 14.04.1-Ubuntu SMP] REPRODUCTION CASE I have attached a php file as well as the screenshots of the possible attack.
,
Sep 21 2016
Hi, what would be helpful for me is rather than trying to run your PHP script, would be if you could provide me with: The portion of the URL containing the XSS payload, and The output from the server (e.g. view-source) that invokes the script.
,
Sep 21 2016
,
Sep 21 2016
Looking at the PHP man page for print_r(), it's going to introduce stray punctuation (e.g. the => in "[x] => y") that wasn't in the original input. XSSAuditor can't guard against every possible transformation, and I don't think this is one we want to cover. Still looking at var_export.
,
Sep 21 2016
Ditto with var_export(), it introduces "=>" in the middle of the expression. I think that we're going to choose not to cover these particular server-side transformations. |
|||
►
Sign in to add a comment |
|||
Comment 1 by elawrence@chromium.org
, Sep 21 2016Labels: -Type-Bug-Security -Restrict-View-SecurityTeam Type-Bug
Summary: XSS Auditor Bypass using PHP var_export and print_r (was: Security: XSS Auditor Bypass vulnerebility)