Issue metadata
Sign in to add a comment
|
XSS Filter Bypass when target is */xml
Reported by
qhdrn1...@gmail.com,
Aug 31 2017
|
||||||||||||||||||||||
Issue descriptionTest environment : Chrome for mac ( 60.0.3112.113 ) XSS Filtering is normally applied when the content-type is text/html, but it is applied to text/xml or application/xml TEST URL : http://123.123.123.123/lloyd.php?test=<script xmlns="http://www.w3.org/1999/xhtml">alert(1234)</script>
,
Aug 31 2017
We track XSS Auditor issues as functional issues rather than security vulnerabilities: https://dev.chromium.org/Home/chromium-security/security-faq#TOC-Are-XSS-filter-bypasses-considered-security-bugs-
,
Aug 31 2017
Everything you say is true, but this is a known limitation of the XSSAuditor. It is part of the HTML parser, not the XML parser and unfortunately will not be able to cover these situations. |
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by qhdrn1...@gmail.com
, Aug 31 2017