Sanitized suspicious request for MDC page
-
- Posts: 8
- Joined: Wed Jul 15, 2009 3:07 am
Sanitized suspicious request for MDC page
Hi, I just saw this while trying to load a page on MDC:
[NoScript InjectionChecker] JavaScript Injection in ///en/XPCOM_Interface_Reference/nsIPromptService#alert()
(function anonymous() {alert();DUMMY_EXPR;})
----------
[NoScript XSS] Sanitized suspicious request. Original URL [https://developer.mozilla.org/en/XPCOM_ ... ce#alert()] requested from [chrome://browser/content/browser.xul]. Sanitized URL: [https://developer.mozilla.org/en/XPCOM_ ... 8036323908].
The page was https://developer.mozilla.org/en/XPCOM_ ... ice#alert()
I'm not sure, but this seems like maybe a false positive. FWIW.
[NoScript InjectionChecker] JavaScript Injection in ///en/XPCOM_Interface_Reference/nsIPromptService#alert()
(function anonymous() {alert();DUMMY_EXPR;})
----------
[NoScript XSS] Sanitized suspicious request. Original URL [https://developer.mozilla.org/en/XPCOM_ ... ce#alert()] requested from [chrome://browser/content/browser.xul]. Sanitized URL: [https://developer.mozilla.org/en/XPCOM_ ... 8036323908].
The page was https://developer.mozilla.org/en/XPCOM_ ... ice#alert()
I'm not sure, but this seems like maybe a false positive. FWIW.
Mozilla/5.0 (Windows NT 6.0; WOW64; rv:15.0) Gecko/15.0 Firefox/15.0a1
Re: Sanitized suspicious request for MDC page
Unable to reproduce on Firefox 12.0, and for the sake of testing non-HTML5, nor on Fx 3.6.28.
Since you're using a highly-experimental build, could you please see if it occurs on stable release F12?
If it does not, there may be an issue to bring to the Moz dev team, thanks.
Since you're using a highly-experimental build, could you please see if it occurs on stable release F12?
If it does not, there may be an issue to bring to the Moz dev team, thanks.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.28) Gecko/20120306 Firefox/12.0
-
- Posts: 8
- Joined: Wed Jul 15, 2009 3:07 am
Re: Sanitized suspicious request for MDC page
I just checked Fx12 and saw it there too. Both my initial report and with Fx12 were with older NoScript versions, so I upgraded to the latest NoScript and I still see it.
STR:
1 - Go to that MDC page
2 - click alert() in the TOC sidebar so you point to the URL fragment that ends with #alert()
3 - reload with that as the URL
4 - I see the redirect and warning from NoScript then.
STR:
1 - Go to that MDC page
2 - click alert() in the TOC sidebar so you point to the URL fragment that ends with #alert()
3 - reload with that as the URL
4 - I see the redirect and warning from NoScript then.
Mozilla/5.0 (Windows NT 6.0; WOW64; rv:15.0) Gecko/15.0 Firefox/15.0a1
Re: Sanitized suspicious request for MDC page
Confirmed on 2.4.2rc6.
Code: Select all
[NoScript XSS] Sanitized suspicious request. Original URL [https://developer.mozilla.org/en/XPCOM_Interface_Reference/nsIPromptService#alert()] requested from [chrome://navigator/content/navigator.xul]. Sanitized URL: [https://developer.mozilla.org/en/XPCOM_Interface_Reference/nsIPromptService#8915678128585843790].
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:14.0) Gecko/20120518 Firefox/14.0a2 SeaMonkey/2.11a2
Re: Sanitized suspicious request for MDC page
I don't seem to find any reference to clicking on some secondary item in the OP, just a link. This step in the OP would have been helpful to reproduce.orangesoda wrote:I just checked Fx12 and saw it there too. Both my initial report and with Fx12 were with older NoScript versions, so I upgraded to the latest NoScript and I still see it.
STR:
1 - Go to that MDC page
2 - click alert() in the TOC sidebar so you point to the URL fragment that ends with #alert()
3 - reload with that as the URL
4 - I see the redirect and warning from NoScript then.
I don't use the TOC sidebar.
I don't find any option in the View menu for a "TOC sidebar".
Firefox Help, as usual (99%+), is no help, not mentioning any TOC Sidebar.
Searching the Web for "firefox+toc+sidebar" produced no results .
Please advise how to enable this (apparently) highly-secret toolbar, and what it is and does, thank you.
Although therube's confirmation should be enough, I'd like to see it, too. Thanks.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.28) Gecko/20120306 Firefox/12.0
Re: Sanitized suspicious request for MDC page
I can see what the OP is talking about.
That page includes an anchor tag with name "#alert()". While you're on the page, you can type
into the address bar, and you're OK; it takes you to the point on the page that documents the 'alert' method. But if you then reload the page, or if you type in that URL while on any other site (including a blank tab), you get an XSS warning.
It's not really wise to use parentheses in an anchor name...and this is on developer.mozilla.org!
That page includes an anchor tag with name "#alert()". While you're on the page, you can type
Code: Select all
https://developer.mozilla.org/en/XPCOM_Interface_Reference/nsIPromptService#alert()
It's not really wise to use parentheses in an anchor name...and this is on developer.mozilla.org!
======
Thrawn
------------
Religion is not the opium of the masses. Daily life is the opium of the masses.
True religion, which dares to acknowledge death and challenge the way we live, is an attempt to wake up.
Thrawn
------------
Religion is not the opium of the masses. Daily life is the opium of the masses.
True religion, which dares to acknowledge death and challenge the way we live, is an attempt to wake up.
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:12.0) Gecko/20100101 Firefox/12.0
Re: Sanitized suspicious request for MDC page
I took "Sidebar" to mean a toolbar, which many users do have. "Table of Contents" would have been more clear.
Agree that it's a site coding problem, not an NS problem. The sanitized URL provided by NS's XSS protection would be a better one to use for that link.
btw, this was unreproducible on Old, Unimproved Fx 3.6.28, regardless of how many iterations, blank tab, etc.
Just another of the hundreds of regressions in New! Improved! F4+.
Agree that it's a site coding problem, not an NS problem. The sanitized URL provided by NS's XSS protection would be a better one to use for that link.
btw, this was unreproducible on Old, Unimproved Fx 3.6.28, regardless of how many iterations, blank tab, etc.
Just another of the hundreds of regressions in New! Improved! F4+.

Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.28) Gecko/20120306 Firefox/12.0
Re: Sanitized suspicious request for MDC page
Why not? It's a perfectly valid anchor name as far as I can see.Thrawn wrote: It's not really wise to use parentheses in an anchor name...
Actually, I disagree that it's not a NoScript problem, it seems like an obvious false positive to me.Tom T. wrote:Agree that it's a site coding problem, not an NS problem. The sanitized URL provided by NS's XSS protection would be a better one to use for that link.
The real issue here is that NoScript's anti-XSS feature is not very sophisticated, because it filters any suspicious URLs regardless of whether they really are dangerous or not. It's unable to distinguish between a false positive and a real risk.
Mozilla/5.0 (X11; Linux i686; rv:13.0) Gecko/20100101 Firefox/13.0
Re: Sanitized suspicious request for MDC page
Parens are valid.
Though the usage of "alert()" (a JavaScript function) is dangerous, XSS vulnerabilities & whatnot. And just what NoScript's XSS is out to prevent
.
Valid:
http://msdn.microsoft.com/en-us/library ... S.85).aspx
Though if you can finagle something like this, then it becomes dangerous.
http://msdn.microsoft.com/en-us/library ... lert("hi")
> It's unable to distinguish between a false positive and a real risk.
Suppose that would depend on whether the site you happen to run into is vulnerable to XSS exploits.
And how is one to determine that?
Though the usage of "alert()" (a JavaScript function) is dangerous, XSS vulnerabilities & whatnot. And just what NoScript's XSS is out to prevent

Valid:
http://msdn.microsoft.com/en-us/library ... S.85).aspx
Though if you can finagle something like this, then it becomes dangerous.
http://msdn.microsoft.com/en-us/library ... lert("hi")
> It's unable to distinguish between a false positive and a real risk.
Suppose that would depend on whether the site you happen to run into is vulnerable to XSS exploits.
And how is one to determine that?
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows NT 5.1; rv:14.0) Gecko/20120524 Firefox/14.0a2 SeaMonkey/2.11a2
Re: Sanitized suspicious request for MDC page
It's legal, but it's not wise, because there are filters like NoScript and PHP-IDS that will flag it as suspicious. There's nothing illegal happening in this webcomic, but...obiwan wrote:Why not? It's a perfectly valid anchor name as far as I can see.Thrawn wrote: It's not really wise to use parentheses in an anchor name...
That depends on what you mean by 'false positive'. NoScript's filters are actually very sophisticated at distinguishing a potential attack from a request that just happens to contain special characters. If something gets filtered, then it was probably capable of being executed as an attack on a site that doesn't properly sanitise requests, and if a site is deliberately injecting scripts - XSS by design - then an attacker can do the same, thus there is a 'real risk'. If a particular site does properly sanitise everything, and the filtering breaks it, and you know how to write regular expressions, then OK, you can add an exception to the XSS filter (Options-Advanced-XSS). In this case, you'll get a warning, but the filtered link will still work, so I'd leave it as-is.obiwan wrote:Actually, I disagree that it's not a NoScript problem, it seems like an obvious false positive to me.Tom T. wrote:Agree that it's a site coding problem, not an NS problem. The sanitized URL provided by NS's XSS protection would be a better one to use for that link.
The real issue here is that NoScript's anti-XSS feature is not very sophisticated, because it filters any suspicious URLs regardless of whether they really are dangerous or not. It's unable to distinguish between a false positive and a real risk.
======
Thrawn
------------
Religion is not the opium of the masses. Daily life is the opium of the masses.
True religion, which dares to acknowledge death and challenge the way we live, is an attempt to wake up.
Thrawn
------------
Religion is not the opium of the masses. Daily life is the opium of the masses.
True religion, which dares to acknowledge death and challenge the way we live, is an attempt to wake up.
Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:12.0) Gecko/20100101 Firefox/12.0
Re: Sanitized suspicious request for MDC page
When all else fails, read the instructions.
XSS FAQ 4.8:
I expected Thrawn's link to lead to this one.

XSS FAQ 4.8:
So there you go.Cross-site requests from a trusted site to a different trusted site are checked through the InjectionChecker engine, which is more accurate and sanitizes only requests which contain conspicuous fragments of HTML or syntactically valid JavaScript.
I expected Thrawn's link to lead to this one.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.28) Gecko/20120306 Firefox/12.0