-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
more javascript uri bypasses with target attr #80
Comments
fml |
also f = document.createElement('form');
f.id = 'pwn';
f.method = 'GET';
f.target = 'xxx';
f.action = 'javascript:alert(1)';
document.body.appendChild(f);
document.querySelector("#pwn").submit(); (making sure it is clear this isn't just in |
the solution to this will probably be around an important initiative Snow is about to go through where we'd have to recommend some basic level of CSP to be integrated with Snow for Snow to be as secure as possible. |
Hm, in both cases (form and anchor tag) it uses |
Definitely! 3-4 months ago, that would be exactly what I would have done. But in those 3-4 months I was introduced to so many vulns in Snow involving non-sufficient HTML sanitization (mostly by @arxenix and @mmndaniel), that I got convinced that Snow cannot achieve its goal without the help of CSP (which btw circles back to your thread on twitter). So atm, we're investigating what is the perfect balance of SNOW&CSP between "CSP too strict to use" and "CSP isn't strict enough to actually help Snow". You're welcome to jump in on this at #109! But the bottom line is that if we can find a good CSP balance that users will feel ok with adopting to use Snow security, it'll allow us to drop support for HTML based Snow vulns, as I'm losing hope for defending against those correctly.. |
The text was updated successfully, but these errors were encountered: