Code: Select all
http://localhost/tests/?q=%F0%E0%20%E7
Code: Select all
[NoScript XSS] Sanitized suspicious request. Original URL [http://localhost/tests/?q=%F0%E0%20%E7] requested from [chrome://browser/content/browser.xul]. Sanitized URL: [http://localhost/tests/?q=%20#3430993393202175486].
Code: Select all
javascript:open('http://localhost/tests/?q='+'%'+'F0' + '%' + 'E0' + '%' + '20' + '%' + 'E7','_self')
Code: Select all
[NoScript XSS] Sanitized suspicious request. Original URL [http://localhost/tests/?q=%F0%E0%20%E7] requested from [about:blank]. Sanitized URL: [http://localhost/tests/?q=%20#35888526449113833969].
- Should chrome: or about:blank origins ever result in XSS?
- Should this particular char sequence trigger XSS? It represents printable Cyrillic chars that a windows-1251 page would submit. But even interpreted as latin it doesn't seem like XSS
- a more general question: in theory % encoding is supposed to be universal, utf-8 based, but in practice it's based on the charset of the page, so what does that mean for decoding and interpreting urls out of context?