Open Questions

Note: You are welcome to write more research questions in the comments.

Current Questions:

  1. Is it possible, in new browsers, to do xss inside a hidden html input tag without getting out of the tag (without ‘>’, ‘<‘)? Basically the question is if there is a way to execute javascript inside hidden input tags? Maybe some new html5 event?
    1. For older browsers it was possible using style attribute, however it doesn’t work on new browsers.
    2. If the injected vector (value attribute) comes before the input type attribute then its possible to inject a type=text attribute which will turn the input tag into text instead of hidden. However the first type attribute is the one which decides the tag type so if the injector vector comes after the type attribute then this trick will not work and we are stuck again.
    3. This post: shows how to do xss in hidden input tags using css. The technique it uses on modern browsers only works on internet explorer and it uses UA-Compatible to turn into old IE compatability mode (EmulateIE7) which allows to execute stuff as though the browser is IE7. However this requires to injection the compatability mode tag into the page and if you are stuck inside a tag then its not possible. He presents a way to overcome this problem: he says that if you have a page which appears in microsoft cv list in compatability mode IE7 and you open an iframe in that page then the content in iframe automatically gets the IE7 compatability mode. The lists of such pages are whitelisted here: , for example the list for IE11: so you need to find a vulnerability in one of the whitelisted pages and inject there an iframe that opens the page you want to exploit the xss at. This is hard and unlikely way to exploit the xss. It does allow the whitelisted pages to exploit the xss though.
    4. It’s possible on firefox to execute script in input hidden when user presses a combination of keys, by using accesskey attribute and onclick. The accesskey attribute helps trigger onclick when the combination is pressed:
  2. Is javascript “postMessage shatter attack” possible or some attack with similar ideas?
    1. In windows before the introduction of zero session isolation in windows vista, there used to be a shatter attack which was based on the idea of sending windows messages from a low priveleged process to a high priveleged window.
    2. Html5 introduced a new api of sending messages to other windows and frame even across domain. The api is postMessage:
    3. See discussion of the possible csrf vulnerability of implementations using postMessage:
    4. So the open question is: can there be a way to utilize the postMessage mechanism like the windows messages mechanism, in order to produce some kind of attack? Since the other window\iframe is on the same browser, overloading its client side resources will not produce the desired result in contrast to the shatter attack. However maybe still there might be some innovative idea utilizing postMessage for an attack?

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s