Don't Say No - XSS Warning?

Ask for help about NoScript, no registration needed to post
User avatar
therube
Ambassador
Posts: 7973
Joined: Thu Mar 19, 2009 4:17 pm
Location: Maryland USA

Don't Say No - XSS Warning?

Post by therube »

Don't Say No - XSS Warning?

NoScript .903, Win7 x64, FF 115 ESR

Search Engine is set to: https://www.startpage.com/

Search, dr. no
First hit, Dr. No (film) - Wikipedia -> https://en.wikipedia.org/wiki/Dr._No_(film)

by default (in Startpage), I have left-click set to open link in new tab

clicking (or center-clicking) the wikipedia page link to, https://en.wikipedia.org/wiki/Dr._No_(film)
generates XSS warning?

Code: Select all

NoScript detected a potential Cross-Site Scripting attack

from https://www.startpage.com to https://en.wikipedia.org.

Suspicious data:

(URL) https://en.wikipedia.org/wiki/Dr._No_(film)


If I paste, 'https://en.wikipedia.org/wiki/Dr._No_(film)' into a new tab & hit return, I get the same (sort of) warning?

Code: Select all

NoScript detected a potential Cross-Site Scripting attack

from [...] to https://en.wikipedia.org.

Suspicious data:

(URL) https://en.wikipedia.org/wiki/Dr._No_(film)

?

(The same does not occur in NoScript 5.1.9 ;-).)
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:128.0) Gecko/20100101 Firefox/128.0 SeaMonkey/2.53.22
barbaz
Senior Member
Posts: 11124
Joined: Sat Aug 03, 2013 5:45 pm

Re: Don't Say No - XSS Warning?

Post by barbaz »

Can confirm that URL trips the XSS filter in NoScript 13.0.8.903. Relevant Browser Console messages:

Code: Select all

[NoScript] [InjectionChecker]  
wiki/Dr._No_(film) /**/
DUMMY_EXPR
 has been flagged as dangerous JS (_() log.js:34:15

[NoScript] [InjectionChecker]  JavaScript Injection in ///wiki/Dr._No_(film)
function anonymous(
) {
wiki/Dr._No_(film) /* COMMENT_TERMINATOR */
DUMMY_EXPR
}
Looks like a false positive, should be safe to allow.
*Always* check the changelogs BEFORE updating that important software!
Mozilla/5.0 (X11; Linux x86_64; rv:142.0) Gecko/20100101 Firefox/142.0
User avatar
amloessb
Posts: 14
Joined: Fri Jun 28, 2013 6:58 am

Re: Don't Say No - XSS Warning?

Post by amloessb »

I am also encountering this issue, even when inputting the URL directly into the navigation bar.

In my case, this is triggered by the Wikipedia page USS William D. Porter (DD-579)

I was going to suggest that presence of a period/full stop & parentheses in the URL was tripping the XSS detection somehow, but then USS John F. Kennedy (CV-67) doesn't trigger the spurious warning.

(NoScript 13.5.5, Firefox 146.0.1, tested on a fresh profile with only NoScript installed)
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:146.0) Gecko/20100101 Firefox/146.0
barbaz
Senior Member
Posts: 11124
Joined: Sat Aug 03, 2013 5:45 pm

Re: Don't Say No - XSS Warning?

Post by barbaz »

Browser Console messages:

Code: Select all

[NoScript] [InjectionChecker]  
wiki/USS_William_D._Porter_(DD-579) /**/
DUMMY_EXPR
 has been flagged as dangerous JS (_()

[NoScript] [InjectionChecker]  JavaScript Injection in ///wiki/USS_William_D._Porter_(DD-579)
function anonymous(
) {
wiki/USS_William_D._Porter_(DD-579) /* COMMENT_TERMINATOR */
DUMMY_EXPR
}
amloessb wrote: Sun Dec 28, 2025 10:16 am I was going to suggest that presence of a period/full stop & parentheses in the URL was tripping the XSS detection somehow, but then USS John F. Kennedy (CV-67) doesn't trigger the spurious warning.
It does for me:

Code: Select all

[NoScript] [InjectionChecker]  
wiki/USS_John_F._Kennedy_(CV-67) /**/
DUMMY_EXPR
 has been flagged as dangerous JS (_()

[NoScript] [InjectionChecker]  JavaScript Injection in ///wiki/USS_John_F._Kennedy_(CV-67)
function anonymous(
) {
wiki/USS_John_F._Kennedy_(CV-67) /* COMMENT_TERMINATOR */
DUMMY_EXPR
}
Quick testing your suggestion, these do not trigger XSS warning:

Code: Select all

http://localhost/foo(aaa)
http://localhost/foo_(aaa)
http://localhost/foo.(aaa)
But these do:

Code: Select all

http://localhost/foo._(aaa)
http://localhost/foo.a(bcd)
The triggering pattern seems to be if it looks like valid Javascript code of the form

Code: Select all

object.function(argument)
Not sure if this can be "globally fixed" without weakening the XSS filter?
*Always* check the changelogs BEFORE updating that important software!
Mozilla/5.0 (X11; Linux x86_64; rv:146.0) Gecko/20100101 Firefox/146.0
Post Reply