That looks like it may be an issue with ERXWOForm._appendHiddenFieldsToResponse 
instead of ERXRequest.

Do you have any other examples of where this can occur?

Ramsey

On Jul 12, 2011, at 12:32 PM, Simon wrote:

> here you go, i just found a WO powered site on the web that will kindly 
> demonstrate the issue. it is sensitive to encoding, but this link should work 
> in chrome and firefox (not got any IE's nearby to test):
> 
> https://secure.kagi.com/cgi-bin/WebObjects/PQ?wosid=3D%22%3E%3Cscript%3Ealert%281%29%3C/scri=pt%3E
> 
> the issue is of course that rather than an alert, someone injects a 
> location.href= that points to a fake site that has an identical login page to 
> yours, and hence you customers unwittingly hand over your login details....
> 
> simon
> 
> On 12 July 2011 18:27, Ramsey Gurley <rgur...@smarthealth.com> wrote:
> I never understood that JIRA.  How does the bad session ID get back into the 
> page?  I would expect a session restoration error page if a bad session ID 
> were maliciously injected.
> 
> Ramsey
> 
> On Jul 12, 2011, at 6:51 AM, Mike Schrag wrote:
> 
>> My recommendation is to only use cookie session ids and actually throw very 
>> early if you get a URL session id.
>> 
>> Sent from my iPhone
>> 
>> On Jul 12, 2011, at 3:36 AM, Simon <si...@potwells.co.uk> wrote:
>> 
>>> i think core WO is still plagued with the wosid cross-scripting issue too. 
>>> we patch it in ERXRequest - not sure if the patch ever made it into wonder 
>>> though...
>>> 
>>> simon
>>> 
>>> 
>>> On 12 July 2011 02:43, Mike Schrag <msch...@pobox.com> wrote:
>>> You have to be mindful of ever rendering any tainted strings ... Any string 
>>> that came from user input should be considered a risk for cross site 
>>> scripting, so that's any field editable by a user, or any query parameter, 
>>> etc. If you append those strings to response or <WOString> render them, 
>>> make sure to escape HTML or strip HTML.
>>> 
>>> ms
>>> 
>>> On Jul 11, 2011, at 9:41 PM, Mai Nguyen wrote:
>>> 
>>> > Do you mean the issue of malicious HTML tags?
>>> >
>>> > I wonder what would be the best way to prevent those?
>>> >
>>> > thanks,
>>> >
>>> > mai
>>> >
>>> >
>>> > On Jul 11, 2011, at 6:36 PM, George Domurot wrote:
>>> >
>>> >> If you output strings with escapeHTML=false, you could have an issue.
>>> >> You may want to consider stripping all potential tags from strings prior 
>>> >> to rendering, or at the time of entry.
>>> >>
>>> >> -G
>>> >>
>>> >> On Jul 11, 2011, at 6:01 PM, Mai Nguyen wrote:
>>> >>
>>> >>> Hello,
>>> >>> I have found some good information about WebObjects and security at the 
>>> >>> following wiki link:
>>> >>>
>>> >>> http://en.wikibooks.org/wiki/WebObjects/Web_Applications/Development/Authentication_and_Security
>>> >>>
>>> >>> However, there is no mention about SQL injections which seems to be an 
>>> >>> active subject lately. Is WebObjects pretty safe, as there is no need 
>>> >>> to generate SQL directly and access to the DB is going through the EOs 
>>> >>> normally?
>>> >>> Are there any other loopholes that I am not aware of?
>>> >>> About the following article:
>>> >>> http://support.apple.com/kb/TA26730?viewlocale=en_US
>>> >>> Would the normal WebObjects behavior be pretty safe if one does not 
>>> >>> allow the user to enter HTML tags? Does Project Wonder do something in 
>>> >>> this area?
>>> >>>
>>> >>> Many thanks for your advice,
>>> >>>
>>> >>> -mai _______________________________________________
>>> >>> Do not post admin requests to the list. They will be ignored.
>>> >>> Webobjects-dev mailing list      (Webobjects-dev@lists.apple.com)
>>> >>> Help/Unsubscribe/Update your Subscription:
>>> >>> http://lists.apple.com/mailman/options/webobjects-dev/george%40boxofficetickets.com
>>> >>>
>>> >>> This email sent to geo...@boxofficetickets.com
>>> >>
>>> >
>>> > _______________________________________________
>>> > Do not post admin requests to the list. They will be ignored.
>>> > Webobjects-dev mailing list      (Webobjects-dev@lists.apple.com)
>>> > Help/Unsubscribe/Update your Subscription:
>>> > http://lists.apple.com/mailman/options/webobjects-dev/mschrag%40pobox.com
>>> >
>>> > This email sent to msch...@pobox.com
>>> 
>>>  _______________________________________________
>>> Do not post admin requests to the list. They will be ignored.
>>> Webobjects-dev mailing list      (Webobjects-dev@lists.apple.com)
>>> Help/Unsubscribe/Update your Subscription:
>>> http://lists.apple.com/mailman/options/webobjects-dev/simon%40potwells.co.uk
>>> 
>>> This email sent to si...@potwells.co.uk
>>> 
>> _______________________________________________
>> Do not post admin requests to the list. They will be ignored.
>> Webobjects-dev mailing list      (Webobjects-dev@lists.apple.com)
>> Help/Unsubscribe/Update your Subscription:
>> http://lists.apple.com/mailman/options/webobjects-dev/rgurley%40smarthealth.com
>> 
>> This email sent to rgur...@smarthealth.com
> 
> 

 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Webobjects-dev mailing list      (Webobjects-dev@lists.apple.com)
Help/Unsubscribe/Update your Subscription:
http://lists.apple.com/mailman/options/webobjects-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Reply via email to