TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Persistent XSS on Twitter.com

62 点作者 forkqueue将近 15 年前

7 条评论

Seldaek将近 15 年前
This has been demo'd a long time ago already [1], and it seems they haven't done anything yet ? Wtf.<p>[1] <a href="http://www.davidnaylor.co.uk/massive-twitter-cross-site-scripting-vulnerability.html" rel="nofollow">http://www.davidnaylor.co.uk/massive-twitter-cross-site-scri...</a>
评论 #1458087 未加载
评论 #1458005 未加载
评论 #1459212 未加载
jluxenberg将近 15 年前
<i>"appears to be due to a lack of input validation of the application name field"</i><p>They should just be sure that they _render_ the application name field appropriately. Angle brackets should be escaped, minimally. It's really not so difficult, Ruby does it with three calls to gsub: <a href="http://rdoc.sourceforge.net/rd/doc/classes/CGI.src/M000003.html" rel="nofollow">http://rdoc.sourceforge.net/rd/doc/classes/CGI.src/M000003.h...</a>
agentultra将近 15 年前
At least this script in particular seems pretty harmless. I glossed over the "rainbow links" code, so maybe there was something vicious in there.<p>Either way, XSS sucks. Surprised that they haven't plugged this one yet.
dirtyhand将近 15 年前
Twitter is probably still using Rails 2.3, where you have to explicitly tell the framework to html escape every time you're outputting a string.<p>Rails 3 changes this by always html escaping strings.
评论 #1458207 未加载
评论 #1458245 未加载
dreeves将近 15 年前
This seems a good time to mention interpolique: <a href="http://recursion.com/interpolique.html" rel="nofollow">http://recursion.com/interpolique.html</a><p>I'm curious what people here think of that idea, ie, preventing string injection attacks at the language level.
code_duck将近 15 年前
Twitter sure does have issues with stuff like this. I noticed a while back that they were double encoding some strings on output, too - I had an ampersand in my location and it was showing as &#38;amp; on the page.
NathanKP将近 15 年前
None of the code looks malicious, but I would suggest that if you have a Twitter account and/or are logged into it, don't visit the page because he might be stealing cookies.