I have lately been testing the scratch website for XSS vulnerabilities, and am happy to announce that as of yet none have arisen. If I think of anything else, I will test it and tell you how it went. Below are the posts which I used to test it.
What I did:
> Tested for parsing of HTML tags. Did so by replacing the < and > symbols with their entity codes.
> Tested for multiple embedded tag parsing.
> Tested Image tag with valid URL
> Tried to exploit IE vulnerability for scripts in src attribute
> Continued above using charactercodes and breaks
> More testing revealed that img tags are just displayed as code if not enclosing a valid url.
> Tried hiding code into 'valid' urls. None worked.
> Deduced that connection protocol must be present to be classed as a valid url.
> Deduced that ampersands proceeded by a hash are parsed as entity code prefixes
> So far, The scratch website is safe!
Last edited by billyedward (2009-07-22 04:27:05)
Offline
<b>TEST</b>
Offline
<str<str<str<str<str<str<str<str<str<strike>ike>ike>ike>ike>ike>ike>ike>ike>ike>XSS test</str</str</str</str</str</str</str</str</str</strike>ike>ike>ike>ike>ike>ike>ike>ike>ike>
Offline

Offline
[img]javascript:alert('XSS attack')[/img]
^ Malicious image src code
Offline
[img]java script:alert('XSS attack')[/img]
Offline
[img]java script:alert('XSS attack')[/img]
Offline
[img]javAscript:alert('XSS attack')[/img]
Offline
[img]alert('XSS attack')[/img]
Offline
[img]javascript[/img]
Offline
[img]java script[/img]
Offline
[img]aRandomWord[/img]
Offline

Offline
Offline
Offline
[img]<!--http://ttt.com/sss.bmp-->[/img]
Offline

Offline
[img]<!--http://ttt.com/sss.bmp-->http://ttt.com/sss.bmp[/img]
Offline

Offline
Offline
Offline
[img]javascript://pi.com[/img]
Offline
[img]javascript.com[/img]
Offline
[img]streak.t35.com/Pictures/big%20logo.gif[/img]
Offline
[img]streak.t35.com:80/Pictures/big%20logo.gif[/img]
Offline