<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>
<!DOCTYPE bugzilla SYSTEM "https://bugs.webkit.org/page.cgi?id=bugzilla.dtd">

<bugzilla version="5.0.4.1"
          urlbase="https://bugs.webkit.org/"
          
          maintainer="admin@webkit.org"
>

    <bug>
          <bug_id>26938</bug_id>
          
          <creation_ts>2009-07-02 15:49:27 -0700</creation_ts>
          <short_desc>XSSAuditor should accommodate common, slight transformations.</short_desc>
          <delta_ts>2009-07-22 16:28:48 -0700</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>1</classification_id>
          <classification>Unclassified</classification>
          <product>WebKit</product>
          <component>JavaScriptCore</component>
          <version>528+ (Nightly build)</version>
          <rep_platform>All</rep_platform>
          <op_sys>All</op_sys>
          <bug_status>RESOLVED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>XSSAuditor</keywords>
          <priority>P2</priority>
          <bug_severity>Normal</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Matthew Murphy">matthew.murphy</reporter>
          <assigned_to name="Nobody">webkit-unassigned</assigned_to>
          <cc>abarth</cc>
    
    <cc>dbates</cc>
    
    <cc>mjs</cc>
          

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>129604</commentid>
    <comment_count>0</comment_count>
    <who name="Matthew Murphy">matthew.murphy</who>
    <bug_when>2009-07-02 15:49:27 -0700</bug_when>
    <thetext>The reflective XSS filter landed in Bug #26199 is too strict in evaluating whether inputs were reflected back into the output.  If, for example, the server-side code does the equivalent of a PHP addslashes() on the input, then the following input will dodge the filter while still executing script:

&lt;script&gt;var bogus=/\/; alert(document.URL);&lt;/script&gt;

The backslash will be doubled, resulting in an output that&apos;s subtly different than its input.

IE&apos;s filter accounts for such subtle differences between input and output using regular expressions, and perhaps we should do the same.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>130389</commentid>
    <comment_count>1</comment_count>
    <who name="Daniel Bates">dbates</who>
    <bug_when>2009-07-08 00:36:44 -0700</bug_when>
    <thetext>Right. We are aware of this issue and it is among our list of improvements.
(In reply to comment #0)
&gt; The reflective XSS filter landed in Bug #26199 is too strict in evaluating
&gt; whether inputs were reflected back into the output.  If, for example, the
&gt; server-side code does the equivalent of a PHP addslashes() on the input, then
&gt; the following input will dodge the filter while still executing script:
&gt; 
&gt; &lt;script&gt;var bogus=/\/; alert(document.URL);&lt;/script&gt;
&gt; 
&gt; The backslash will be doubled, resulting in an output that&apos;s subtly different
&gt; than its input.
&gt; 
&gt; IE&apos;s filter accounts for such subtle differences between input and output using
&gt; regular expressions, and perhaps we should do the same.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>133980</commentid>
    <comment_count>2</comment_count>
    <who name="Adam Barth">abarth</who>
    <bug_when>2009-07-22 16:28:48 -0700</bug_when>
    <thetext>Dan fixed this in http://trac.webkit.org/changeset/46250</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>