CSS Exfil Vulnerability

General discussion and chat (archived)
Locked
Sampei Nihira
Banned user
Banned user
Posts: 96
Joined: 2018-04-03, 16:17

CSS Exfil Vulnerability

Post by Sampei Nihira » 2018-11-05, 07:18

https://www.mike-gualtieri.com/css-exfi ... ity-tester

Pale Moon is vulnerable.
At least this results from the test.

Is it possible to remedy this?

TH.
Last edited by Sampei Nihira on 2018-11-05, 07:18, edited 1 time in total.

User avatar
Moonchild
Pale Moon guru
Pale Moon guru
Posts: 29658
Joined: 2011-08-28, 17:27
Location: Tranås, SE
Contact:

Re: CSS Exfil Vulnerability

Post by Moonchild » 2018-11-05, 13:59

It's bad website design abused. This isn't up to a browser to fix.

Details:
This "vulnerability" relies on bad form design:

Code: Select all

value="<?php echo $_GET['username']; ?>
Anyone with an ounce of php knowledge on public-facing websites knows that this is asking for XSS. You NEVER, EVER reflect back PHP variables unsanitized.
"Son, in life you do not fight battles because you expect to win, you fight them merely because they need to be fought." -- Snagglepuss
Image

Sampei Nihira
Banned user
Banned user
Posts: 96
Joined: 2018-04-03, 16:17

Re: CSS Exfil Vulnerability

Post by Sampei Nihira » 2018-11-05, 17:20

Mike Gualtieri has developed an extension for Chrome and Firefox ****:

https://chrome.google.com/webstore/deta ... kifo?hl=en

https://addons.mozilla.org/en-US/firefo ... rotection/

What do you think about it?
It's useless?

Thank you very much. :thumbup:


**** = Can not be installed with Pale Moon and Basilisk
Last edited by Sampei Nihira on 2018-11-05, 17:22, edited 1 time in total.

User avatar
JustOff
Moon Magic practitioner
Moon Magic practitioner
Posts: 2083
Joined: 2015-09-03, 19:47
Location: UA
Contact:

Re: CSS Exfil Vulnerability

Post by JustOff » 2018-11-05, 17:41

I can't say how effective it is, but at first glance it certainly has a bad impact on performance and can potentially break websites.
Here are the add-ons I made in a spare time. That was fun!

If you have any questions or problems regarding the migration of my extensions to GitHub, feel free to contact me through a PM.

Sampei Nihira
Banned user
Banned user
Posts: 96
Joined: 2018-04-03, 16:17

Re: CSS Exfil Vulnerability

Post by Sampei Nihira » 2018-11-06, 18:13

E-mail to Mike Gualtieri:

Subject: A Legacy version your extension.
Message: Hi Mike Is it possible to obtain a legacy version of its extension for the protection of browsers such as Pale Moon and Basilisk? It would be greatly appreciated. TH.

Mike's answer:

Sampei,

Thanks for your note! I'll certainly consider it, but I can't promise anything. You are the first to ask for this. As you may already know, to provide functionality for Pale Moon and similar browsers, it would require a complete rewrite of the plugin under the XUL framework. It's been about 10 years since I've played around with XUL so there would need to be some exploration into how the plugin might work before anything.

Mike

Locked