Hi, I've come accross a site which runs the following script which turns out is an attack script of some sort. The problem is that this is apparently Javascript which has run despite NoScript being enabled against the page. Running 1.9.3.3.
It's probably better if I don't link the site, but here's the page source:
The source code you quoted is pretty innocuous (there's no "attack" whatsoever). It just checks if there's an user name specificied in the URL (like http://someuser@somesite.com) and, if it's found, redirects to http://somesite.com/~someuser/, which is the standard URL for "someuser's home" since the Web was still an Unix-only thing. If the URL contains no username, it redirects to index.html.
After that script, there's a <META> refresh element which automatically redirects to index.html if scripts aren't running. What you're observing as a "running script" it's probably just the behavior of this <META> refresh. No script can run if the site is not whitelisted by NoScript. Period.
Agreed, this code is harmless and many shared hosting plans also recommend/use a case based redirect for ASP sites because some server refreshes are not valid for shared hosting. Anyway, its harmless and regardless of harmful or harmless, if its a script and the site is not whitelisted, it WILL NOT run with NS enabled, unless you have enabled domain by default checked in the settings.
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~ ________________ .: [ Major Mike's ] :. ________________
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.0.11) Gecko/2009060215 Firefox/3.0.11