XSS Sanitizing Login redirection

Ask for help about NoScript, no registration needed to post
Guest

XSS Sanitizing Login redirection

Post by Guest »

I'm running into a XSS redirection problem when I try to login to a local cafe. When I launch Firefox 3.0.10 my homepage is redirected to the cafe's (SonicWall) login screen. However because NoScript has sanitized it I can enter the login but I can't get past the login screen. If I turn off Advanced XSS filtering it works OK and after entering my login info I am redirected to my homepage.

Here is the log entry:

[NoScript XSS]
Sanitized suspicious request.
Original URL [http://10.10.10.10/peets/default.asp?ss ... rce%3Diglk] requested from [http://172.16.31.1/externalGuestRedirec ... rectPage=0].
Sanitized URL: [http://10.10.10.10/peets/default.asp?ss ... rce%3Diglk].

I'm not that good with Regex and I need some help sorting this out! Also, do I need to whitelist both of these private IP's to make this work? I have the 10 network whitelisted already.

Thanks!
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.10) Gecko/2009042316 Firefox/3.0.10 (.NET CLR 3.5.30729)
User avatar
therube
Ambassador
Posts: 7969
Joined: Thu Mar 19, 2009 4:17 pm
Location: Maryland USA

Re: XSS Sanitizing Login redirection

Post by therube »

(Just to point out that both 10.*.*.* & (a good portion of & including that listed above) 172.*.*.* are non-routable IPs.)
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b5pre) Gecko/20090429 SeaMonkey/2.0b1pre
User avatar
GµårÐïåñ
Lieutenant Colonel
Posts: 3369
Joined: Fri Mar 20, 2009 5:19 am
Location: PST - USA
Contact:

Re: XSS Sanitizing Login redirection

Post by GµårÐïåñ »

Yes but if they are on an intranet or however configured to work, regex filter for the XSS on the patter could allow the OP to still use the function. I don't think routability is an issue here but I could be wrong.
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.0.10) Gecko/2009042316 Firefox/3.0.10
User avatar
Giorgio Maone
Site Admin
Posts: 9524
Joined: Wed Mar 18, 2009 11:22 pm
Location: Palermo - Italy
Contact:

Re: XSS Sanitizing Login redirection

Post by Giorgio Maone »

This is a false positive and will be fixed.
In the meanwhile, just add the following line to your XSS exceptions box:

Code: Select all

^http://10\.10\.10\.10/[^<'"]+$
Good luck and let me know.
Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.0.10) Gecko/2009042316 Firefox/3.0.10 (.NET CLR 3.5.30729)
Guest

Re: XSS Sanitizing Login redirection

Post by Guest »

My guess is that they are using a combination WiFi / firewall appliance. The login is in the DMZ which allows them to redirect for authentication which is coming from a central source. The way it works from the customers perspective is that you request a Internet access with your order and are given a receipt with a four digit code. Boot your system, obtain an IP address from their DHCP and launch your browser. The browser is redirected the appliances DMZ which hosts an authentication page where the four digit code is entered. Upon a positive authentication the next screen offers you a link to your original destination homepage.

Under normal circumstances it is one of the more efficient systems I've run across.
GµårÐïåñ wrote:Yes but if they are on an intranet or however configured to work, regex filter for the XSS on the patter could allow the OP to still use the function. I don't think routability is an issue here but I could be wrong.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.10) Gecko/2009042316 Firefox/3.0.10 (.NET CLR 3.5.30729)
Grateful Guest

Re: XSS Sanitizing Login redirection

Post by Grateful Guest »

Giorgio Maone wrote:This is a false positive and will be fixed.
Oh, I hate it when that happens! :D
Giorgio Maone wrote:In the meanwhile, just add the following line to your XSS exceptions box:

Code: Select all

^http://10\.10\.10\.10/[^<'"]+$
Good luck and let me know.
Thank you very much! I appreciate you taking the time to help me!
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.10) Gecko/2009042316 Firefox/3.0.10 (.NET CLR 3.5.30729)
Guest

[Resolved] Re: XSS Sanitizing Login redirection

Post by Guest »

I added the snippet and it works perfectly! Thanks again!! :mrgreen:

Code: Select all

^http://10\.10\.10\.10/[^<'"]+$
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.10) Gecko/2009042316 Firefox/3.0.10 (.NET CLR 3.5.30729)
Post Reply