Cmseasy latest version of stored XSS (xss protection mechanism can be bypassed) #2
Html is a very interesting language ..
The xss code in the bbs posting area of cmseasy performs a complete filtering of the html code in
function xss_clean($data) { if (empty($data)) { return $data; } if (is_array($data)
Essence of XSS InjectionThat is, an executable js Code is generated on a webpage based on user input, and the JavaScript code is executed by the browser. the string sent to the Browser contains an invalid js code, which is related to the user input.
Common XSS injection protection can be implemented through simple htmlspecialchars (Escape special characters in HT
. This is almost impossible in the 2nd class attacks.6. Introducing a simple visual representation of user interaction can block almost all unexpected privileged operations.7. Use Dynamic JavaScript only when anonymous access is allowed.8. check whether any suspicious operations, such as redirection back to the site or not, are performed on IMG and other links in the information submitted by the user.9. When there are many problems with the internal management of websites, the internal managemen
"title=" 5.jpg "alt=" Wkiom1hsjmfwzf0naaagfjqssxg106.jpg-wh_50 "/>The contents of the Access log are:650) this.width=650; "Src=" Http://s4.51cto.com/wyfs02/M00/8C/70/wKiom1hsjr3Ci9D1AAAuMBXMc7c721.jpg-wh_500x0-wm_3 -wmp_4-s_3619253538.jpg "title=" 6.jpg "alt=" Wkiom1hsjr3ci9d1aaaumbxmc7c721.jpg-wh_50 "/>Test result: Using a cross-site vulnerability is not able to obtain cookie content.This article is from the "mask_x blog" blog, please be sure to keep this source http://zhpfbk.blog.51cto.com/47
XSS is all called Cross Site Scripting, and the user intentionally or unintentionally enters some malicious characters in the form, which destroys the performance of the page!Look at common malicious characters for XSS input:1.XSS input typically contains JavaScript scripts, such as pop-up malicious warning boxes: The 2.XSS
(' ". escape_str, DB, $this($title). "')"
$this->db->escape_like_str () This function is used to process strings in the like statement.
In this way, the like wildcard ('% ', ' _ ') can be escaped correctly.
' 20% raise ';
escape_like_str($search), $this, DB. % ' ESCAPE '! ' " * Escape here is a little need to get under,$this->db->escape () after using this function, the variable will automatically add a single quotation mark o
For example, our attribute hooks only consider setAttribute, but ignore similar setattributenode. Although this method has never been used, it does not mean that others cannot use it.For example, creating an element is usually a createelement, in fact Createelementns is also possible. You can even use ready-made elements to cloneNode and achieve your goals. Therefore, these are all marginal approaches that are worth considering.Here we review the monitoring points discussed previously.Inline Eve
version : v1.1Update time : 2013-05-25what 's new: Optimizing Performancefunction Description :
can effectively protect xss,sql injection, code execution, file inclusion and many other high-risk vulnerabilities.
How to use:
Upload waf.php to the directory of files to include
To add protection to the page, there are two ways to do this, depending on the situation two:
The previous article (http://www.bkjia.com/Article/201406/310933.html) explained the hook program attack and defense practices, and achieved a set of framework page monitoring solution, will protect all sub pages.
So far, our protection depth is almost the same, but the breadth is still lacking.
For example, our property hook only considers setAttribute, but ignores the setAttributeNode. Although this method is never used, it does not mean that people
The previous article explains the attack and defense practices of the hook program, and implements a monitoring solution for the Framework page, which will protect all subpages.
So far, our protection depth is almost the same, but the breadth is still lacking.
For example, our property hook only considers setattribute, but ignores the setattributenode. Although this method is never used, it does not mean that people cannot use it.
For example, createe
It's boring to get bored... turn a post and think it's fun.-_-English is not very good. translation is not very good. Don't blame me... you can understand it. The source is http://soroush.secproject.com/blog/2012/08/ie9-self-xss-blackbox-protection-bypass/ . -==================================== Dear split line ===================== ======================== To Be Honest, self-
A Cross-Site XSS vulnerability in Baidu can bypass chrome filter Protection
It can be used as a chrome filter Bypass case, so let's talk about it.
Today, I opened the Baidu homepage and found that I could draw a lottery. So I clicked in and looked at it.
http://api.open.baidu.com/pae/ecosys/page/lottery?type=videowd=xxnowType=lotterysite=iqiyi
But I didn't get it for half a day, so I just clicked it and l
The essence of XSS injection is: a Web page in accordance with user input, do not expect to generate the executable JS code, and JS has been the implementation of the browser. This means that the string that is sent to the browser contains an illegal JS code that is related to the user's input.
Common XSS injection defenses can be addressed by simple Htmlspecialchars (escape HTML special characters), Strip
ThinkSAAS 2.2 storage-type XSS (bypassing protection mechanism)
Code snippets filtered by rich text:
Function cleanJs ($ text) {$ text = trim ($ text); // $ text = stripslashes ($ text ); // fully filter comments $ text = @ preg_replace ('/
Event Filtering
while ( preg_match ( '/(
Filtered so much... But there is a problem with this regular expression. We can ignore the detection in double quotation marks.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.