<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:x="urn:schemas-microsoft-com:office:excel" xmlns:p="urn:schemas-microsoft-com:office:powerpoint" xmlns:a="urn:schemas-microsoft-com:office:access" xmlns:dt="uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s="uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs="urn:schemas-microsoft-com:rowset" xmlns:z="#RowsetSchema" xmlns:b="urn:schemas-microsoft-com:office:publisher" xmlns:ss="urn:schemas-microsoft-com:office:spreadsheet" xmlns:c="urn:schemas-microsoft-com:office:component:spreadsheet" xmlns:oa="urn:schemas-microsoft-com:office:activation" xmlns:html="http://www.w3.org/TR/REC-html40" xmlns:q="http://schemas.xmlsoap.org/soap/envelope/" xmlns:D="DAV:" xmlns:x2="http://schemas.microsoft.com/office/excel/2003/xml" xmlns:ois="http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir="http://schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:dsp="http://schemas.microsoft.com/sharepoint/dsp" xmlns:udc="http://schemas.microsoft.com/data/udc" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:sub="http://schemas.microsoft.com/sharepoint/soap/2002/1/alerts/" xmlns:ec="http://www.w3.org/2001/04/xmlenc#" xmlns:sp="http://schemas.microsoft.com/sharepoint/" xmlns:sps="http://schemas.microsoft.com/sharepoint/soap/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:udcxf="http://schemas.microsoft.com/data/udc/xmlfile" xmlns:wf="http://schemas.microsoft.com/sharepoint/soap/workflow/" xmlns:mver="http://schemas.openxmlformats.org/markup-compatibility/2006" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns:mrels="http://schemas.openxmlformats.org/package/2006/relationships" xmlns:ex12t="http://schemas.microsoft.com/exchange/services/2006/types" xmlns:ex12m="http://schemas.microsoft.com/exchange/services/2006/messages" xmlns:Z="urn:schemas-microsoft-com:" xmlns="http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<meta name=Generator content="Microsoft Word 12 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<title>[Owasp-antisamy] onsiteURL and offsiteURL accept urls withparameters</title>
<style>
<!--
 /* Font Definitions */
 @font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Tahoma;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
p
        {mso-style-priority:99;
        mso-margin-top-alt:auto;
        margin-right:0in;
        mso-margin-bottom-alt:auto;
        margin-left:0in;
        font-size:12.0pt;
        font-family:"Times New Roman","serif";}
span.EmailStyle18
        {mso-style-type:personal-reply;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page Section1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.Section1
        {page:Section1;}
 /* List Definitions */
 @list l0
        {mso-list-id:1376467229;
        mso-list-template-ids:-1462858144;}
ol
        {margin-bottom:0in;}
ul
        {margin-bottom:0in;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext="edit">
  <o:idmap v:ext="edit" data="1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=EN-US link=blue vlink=purple>

<div class=Section1>

<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'>Maybe the malware blacklist API is reasonable, but otherwise I&#8217;d
like to stay out of the integrator&#8217;s hair. Every other link on Slashdot is
goatse, and that&#8217;s than malware, so I don&#8217;t think they really care. =]<o:p></o:p></span></p>

<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'>Arshan<o:p></o:p></span></p>

<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<div>

<div style='border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'>

<p class=MsoNormal><b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span></b><span
style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'> Jim Manico
[mailto:jim@manico.net] <br>
<b>Sent:</b> Friday, June 13, 2008 2:22 AM<br>
<b>To:</b> Arshan Dabirsiaghi; Carlos Aguayo; owasp-antisamy@lists.owasp.org<br>
<b>Subject:</b> RE: [Owasp-antisamy] onsiteURL and offsiteURL accept urls
withparameters<o:p></o:p></span></p>

</div>

</div>

<p class=MsoNormal><o:p>&nbsp;</o:p></p>

<p class=MsoNormal style='margin-bottom:12.0pt'><span style='font-size:10.0pt;
font-family:"Arial","sans-serif"'>IMO, AntiSamy should not allow all arbitrary
urls. There should at least be hooks to verify urls through malware blacklists
like Google's malware blacklist API provides. I would suspect that Slashdot is
doing something like this already.<br>
<br>
- Jim<br>
<br>
</span><o:p></o:p></p>

<div class=MsoNormal align=center style='text-align:center'>

<hr size=2 width="100%" align=center>

</div>

<p class=MsoNormal style='margin-bottom:12.0pt'><b><span style='font-size:10.0pt;
font-family:"Tahoma","sans-serif"'>From: </span></b><span style='font-size:
10.0pt;font-family:"Tahoma","sans-serif"'>Arshan Dabirsiaghi
&lt;arshan.dabirsiaghi@aspectsecurity.com&gt;</span><br>
<b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Sent: </span></b><span
style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Thursday, June 12,
2008 6:57 AM</span><br>
<b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'>To: </span></b><span
style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Carlos Aguayo
&lt;carlos.aguayo@gmail.com&gt;; owasp-antisamy@lists.owasp.org</span><br>
<b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Subject: </span></b><span
style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Re: [Owasp-antisamy]
onsiteURL and offsiteURL accept urls withparameters</span><o:p></o:p></p>

<div>

<p class=MsoNormal><span style='font-size:10.0pt;font-family:"Arial","sans-serif";
color:black'>There are two&nbsp;reasons why we allow arbitrary HTTP URLs:</span><o:p></o:p></p>

</div>

<div>

<ol start=1 type=1>
 <li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
     mso-list:l0 level1 lfo1'><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>It's
     the Slashdot policy file, so we do exactly what Slashdot does.</span><o:p></o:p></li>
</ol>

</div>

<div>

<ol start=2 type=1>
 <li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
     mso-list:l0 level1 lfo1'><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>That
     is the point of AntiSamy in general: to allow rich input.</span><o:p></o:p></li>
</ol>

</div>

<p><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>You can lock
down a policy file as much as you want, but the more you lock it down, the less
useful it is to your users.&nbsp;If you prevent URL parameters from being in a
URL, users can't put up a link to a CNN article, or their profile page on a
social network, etc.</span><o:p></o:p></p>

<p><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Hope that
helps.</span><o:p></o:p></p>

<p><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Cheers,<br>
Arshan</span><o:p></o:p></p>

<div>

<p class=MsoNormal><o:p>&nbsp;</o:p></p>

</div>

<div>

<div class=MsoNormal align=center style='text-align:center'>

<hr size=2 width="100%" align=center>

</div>

</div>

<div>

<p class=MsoNormal style='margin-bottom:12.0pt'><b><span style='font-size:10.0pt;
font-family:"Tahoma","sans-serif"'>From:</span></b><span style='font-size:10.0pt;
font-family:"Tahoma","sans-serif"'> owasp-antisamy-bounces@lists.owasp.org on
behalf of Carlos Aguayo<br>
<b>Sent:</b> Thu 6/12/2008 11:35 AM<br>
<b>To:</b> owasp-antisamy@lists.owasp.org<br>
<b>Subject:</b> [Owasp-antisamy] onsiteURL and offsiteURL accept urls
withparameters</span><o:p></o:p></p>

</div>

<div>

<p><span style='font-size:10.0pt'>Hi,<br>
By default both onsiteURL and offsiteURL accept url with parameters,<br>
for example, the following link:<br>
<br>
&lt;a href=&quot;<a href="http://mysite.com/?first=12345&amp;second=34567">http://mysite.com?first=12345&amp;second=34567</a>&quot;&gt;click
here&lt;/a&gt;<br>
<br>
would pass using AntiSamy slashdot policy. Ultimately using AntiSamy<br>
an attacked shouldn't be able to dynamically craft th</span><o:p></o:p></p>

</div>

<p class=MsoNormal><br>
<br>
[The entire original message is not included]<o:p></o:p></p>

</div>

</body>

<!--[object_id=#aspectsecurity.com#]--></html>