[Owasp-delhi] NoScript ( < less ) - Bypass "Reflective XSS" through Union SQL Poisoning Trick (SQLXSSI)

Rohit Bansal rohitisback at gmail.com
Thu Nov 25 13:29:45 EST 2010

Hi List

NoScript fails to detect the reflective XSS from trusted domains when an
attack is conducted through SQLXSSI. The bypass in NoScript has been
successfully conducted by using "Reflective XSS" through Union SQL
poisoning attacks by exploiting the reverted errors in the browser. The
attack string used to bypass is stated below


The attacker can create a potential attack patterns using the above stated

The exploitation video has been released at SecNiche Security channel -

Disclosure: The bug was disclosed to the author on 24th November 2010. A
new version of NoScript 2.0.6 is released today (25th November 2010).
Further, NoScript 2.0.6 version fails to combat against this attack vector
and can be bypassed with the same.

Thanks & Regards
Rohit Bansal
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.owasp.org/pipermail/owasp-delhi/attachments/20101125/b444d145/attachment.html 

More information about the Owasp-delhi mailing list