Hello,
I had the following problem yesterday, which I believe was caused by a combination of problems on the website and NoScript (so not one or the other alone).
I was trying to order furniture from IKEA, using my VISA debit card. When I entered my details, the "verified by VISA" thing came up; I think that's an iframe, I'm not sure.
What normally happens (with other websites) is that this does something for a few seconds then I'm redirected to another page in the website where it says my details have been confirmed and the order is placed.
What happened this time was that, after the verification, NoScript said it blocked an attempted XSS and the website showed an error. I tried to add ikea to the exceptions, using the following regular expression: ^https://.*ikea\.com/.*$
Again the same thing happened, so I tried it a few times, only to find out -in the end- that while my order never went through (so I'm not receiving anything), the money was taken from my account.
To make it clear, I'm not accusing NoScript for this loss (which I'm in contact with my bank to resolve), only trying to understand what I could do to prevent it in the future and whether anyone has had a problem like this. Is my regular expression wrong? Is it a different url I should have used in it?
XSS protection problem
-
GeorgeT
XSS protection problem
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:33.0) Gecko/20100101 Firefox/33.0
- Giorgio Maone
- Site Admin
- Posts: 9546
- Joined: Wed Mar 18, 2009 11:22 pm
- Location: Palermo - Italy
- Contact:
Re: XSS protection problem
What you probably needed to do was just allowing all the intermediate sites for scripting, including the "Verified by Visa" proxy which we don't know from your report, with no regular expression exception involved.
That the money was taken from your account without you entering your "Verified by Visa" credentials is extremely weird: preventing unauthorized transaction is the whole point of the VbV program.
What would help diagnosing and, if possible, fixing this problem for the feature would be looking at your error console as soon as the XSS notification comes up and analyzing any "[NoScript XSS]" and/or "[Injection Checker]" message there.
That the money was taken from your account without you entering your "Verified by Visa" credentials is extremely weird: preventing unauthorized transaction is the whole point of the VbV program.
What would help diagnosing and, if possible, fixing this problem for the feature would be looking at your error console as soon as the XSS notification comes up and analyzing any "[NoScript XSS]" and/or "[Injection Checker]" message there.
Mozilla/5.0 (Windows NT 6.3; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0
Re: XSS protection problem
And possibly using NoRedirect set to block all redirects (remove all rules, then add a rule as follows:
Regex: .*
check only "Source") to get the URLs of the intermediate sites so that it's less likely the NoScript console message(s) will get pushed out and it's easier for you to make an XSS exception (see the sticky for how to do that; please post what worked for you).
Regex: .*
check only "Source") to get the URLs of the intermediate sites so that it's less likely the NoScript console message(s) will get pushed out and it's easier for you to make an XSS exception (see the sticky for how to do that; please post what worked for you).
*Always* check the changelogs BEFORE updating that important software!
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:31.0) Gecko/20100101 SeaMonkey/2.28.2-unofficial-1
-
GeorgeT
Re: XSS protection problem
Thanks for the reply. I only thought about copying the information from the console after I had closed FF, by which time it was too late.
Regarding VbV, I had already entered my credentials at that point. The error was when VbV tried to tell IKEA that verification was successful, I think. VbV knew it was OK but IKEA didn't.
You said I should have allowed scripting from all sites. Would that have prevented the XSS thing? I thought they were separate. I did get a message saying "Javascript seems to be disabled, please click here" message before the mess happened, so I guess that would have prevented it. I tried to find which site needed to be allowed to avoid that but couldn't figure it out.
barbaz: I'll look at that extension, thanks for the suggestion.
Regarding VbV, I had already entered my credentials at that point. The error was when VbV tried to tell IKEA that verification was successful, I think. VbV knew it was OK but IKEA didn't.
You said I should have allowed scripting from all sites. Would that have prevented the XSS thing? I thought they were separate. I did get a message saying "Javascript seems to be disabled, please click here" message before the mess happened, so I guess that would have prevented it. I tried to find which site needed to be allowed to avoid that but couldn't figure it out.
barbaz: I'll look at that extension, thanks for the suggestion.
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:33.0) Gecko/20100101 Firefox/33.0
- Giorgio Maone
- Site Admin
- Posts: 9546
- Joined: Wed Mar 18, 2009 11:22 pm
- Location: Palermo - Italy
- Contact:
Re: XSS protection problem
The rules for requests from non-whitelisted to whitelisted websites are stricter.GeorgeT wrote: You said I should have allowed scripting from all sites. Would that have prevented the XSS thing? I thought they were separate.
Hence, if IKEA was whitelisted but the VbV processor was not, a XSS sanitization was more likely to happen.
Mozilla/5.0 (Windows NT 6.3; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0
Re: XSS protection problem
This is the canonical use case for my suggested interactive mode.
======
Thrawn
------------
Religion is not the opium of the masses. Daily life is the opium of the masses.
True religion, which dares to acknowledge death and challenge the way we live, is an attempt to wake up.
Thrawn
------------
Religion is not the opium of the masses. Daily life is the opium of the masses.
True religion, which dares to acknowledge death and challenge the way we live, is an attempt to wake up.
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:33.0) Gecko/20100101 Firefox/33.0