Client side hacking with noscript (FF-addon) enabled
http://h.ackack.net/client-side-hacking ... abled.html
Break NoScript
Break NoScript
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3
- Giorgio Maone
- Site Admin
- Posts: 9524
- Joined: Wed Mar 18, 2009 11:22 pm
- Location: Palermo - Italy
- Contact:
Re: Break NoScript
And so? They're nearly-DOS (you've got a chance to stop the unresponsive script in most cases).
There are several ways to perform them by overloading either the HTML parser or the JavaScript interperter, but they're not even cosidered low-impact vulnerabilities, just (ugly) annoyances.
Regarding the claim of having temporarily disabled the XSS filter, I've got my share of doubts, since the InjectionChecker component, like other filtering features of NoScript including ABE, have an anti-DOS mechanism which makes the HTTP request to be filtered fail fast in case a DOS prevents the filter from complete.
Most likely the researcher was testing same-site, therefore no cross-site request to be filtered was performed in first instance (he openly said he didn't manage to reproduce).
There are several ways to perform them by overloading either the HTML parser or the JavaScript interperter, but they're not even cosidered low-impact vulnerabilities, just (ugly) annoyances.
Regarding the claim of having temporarily disabled the XSS filter, I've got my share of doubts, since the InjectionChecker component, like other filtering features of NoScript including ABE, have an anti-DOS mechanism which makes the HTTP request to be filtered fail fast in case a DOS prevents the filter from complete.
Most likely the researcher was testing same-site, therefore no cross-site request to be filtered was performed in first instance (he openly said he didn't manage to reproduce).
Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.2.8) Gecko/20100722 Firefox/3.6.8
- GµårÐïåñ
- Lieutenant Colonel
- Posts: 3369
- Joined: Fri Mar 20, 2009 5:19 am
- Location: PST - USA
- Contact:
Re: Break NoScript
Also consider that many who are being subverted and nuked by NoScript and prevented from damaging you have an axe to grind and will mostly likely try to go the route of FUD to get people to doubt their security and drop it and then they are open wide for them to do what they want. The fact is that NoScript has features that protect you even when your AV doesn't, that's protection and until I see it in black and white and for myself, I will NEVER (and I recommend others to follow the same) drop my security on the word of some anonymous or ignorant individual spreading false, half-assed or just outright wrong information or trying to use fear and suspicion to cast doubt on the only line of security that stands between us and them in 110% of the time. That's right, more than 100% because often NS will catch, cripple and disarm something that no one has even seen yet and most security software have not even had a chance to react to and catch up after the fact when the damage is already done. It even protects against stupid changes in the Fx core that often cause vulnerability, its built THAT WELL. I have a system that has NO AV, NO SPAM, NO ANTI-MALWARE, NO FIREWALL and only NoScript and I have never in my entire 4 years of using this machine as my POC have I seen a single bug get through, even those that crippled MANY who had "security" tools ups the wazoo, and I use this system to browse some of the WORST places on the web notorious for viruses, worms, malware, adware and etc, so what does that say about NS? Its priceless and we are getting for free. I thank each and every day for Giorgio and so should everyone else. The better you are and the closer to the BEST that you are, the more people take shots at you and try to bring you down.
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
________________ .: [ Major Mike's ] :. ________________
Mozilla/Gecko
Re: Break NoScript
NoScript New Bypass Method by Unicode in ASP
http://soroush.secproject.com/blog/2010 ... de-in-asp/
http://soroush.secproject.com/blog/2010 ... de-in-asp/
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3
Re: Break NoScript
Right, except it doesn't bypass NoScript at all. All it does is give you a way to sneak reflected XSS past the NoScript XSS protection using a non-standard, proprietary feature of questionable usefulness (which is still blocked if that XSS payload relies on an external .js file, or if the vulnerable site isn't allowed to execute scripts).WTF wrote:NoScript New Bypass Method by Unicode in ASP
http://soroush.secproject.com/blog/2010 ... de-in-asp/
Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.8) Gecko/20100722 Firefox/3.6.8
- Giorgio Maone
- Site Admin
- Posts: 9524
- Joined: Wed Mar 18, 2009 11:22 pm
- Location: Palermo - Italy
- Contact:
Re: Break NoScript
I dare say, so incredibly stupid (automatically translating random unicode characters into ASCII homographs based on a vague visual resemblance) that even Microsoft decided it was too much a shame and removed it from ASP.NETGuest wrote: non-standard, proprietary feature of questionable usefulness

Anyway, I'm currently performing some tests to find how many unicode characters receive this idiotic treatment and will bake a work-around in next NoScript version.
Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.2.8) Gecko/20100722 Firefox/3.6.8
- Giorgio Maone
- Site Admin
- Posts: 9524
- Joined: Wed Mar 18, 2009 11:22 pm
- Location: Palermo - Italy
- Contact:
Re: Break NoScript
Work around in latest development build.
Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.2.8) Gecko/20100722 Firefox/3.6.8
- GµårÐïåñ
- Lieutenant Colonel
- Posts: 3369
- Joined: Fri Mar 20, 2009 5:19 am
- Location: PST - USA
- Contact:
Re: Break NoScript
This is a hardly coherent or useful presentation of a concept that in actually as already mentioned doesn't do squat to defeat NS, just because you can make it LOOK like you are bypassing, doesn't equal ACTUAL bypassing. I refer you to read up on the BlackICE fiasco long ago where the things that would slip by their firewall was later HARDCODED to make it look like it was catching it but in actuality it wasn't. You can probably find an old archived copy on GRC.comWTF wrote:NoScript New Bypass Method by Unicode in ASP
http://soroush.secproject.com/blog/2010 ... de-in-asp/
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
________________ .: [ Major Mike's ] :. ________________
Mozilla/Gecko