å¤ã¨ãããã¨ã§ãæã話ããã¾ãã Webã¢ããªã±ã¼ã·ã§ã³éçºè ã®çãããèãã¦ä¸ããã æéããªã人ããä»ã®äººã«åé¡ã説æããã¨ããªã©ã«ã¯ç°¡æ½ã«ã¾ã¨ããçãã©ããã ããã¯2011å¹´12æ27æ¥ã«Appleã«å ±åããSafariã®åé¡ã§ããAppleããã¯ä¿®æ£ããäºå®ã¯ãªãã¨ããåçãè²°ã£ã¦ãã¾ãããã2012å¹´7æ25æ¥ã«ãªãªã¼ã¹ãããMacã®Safari 6ã®ã¢ããã¤ã¶ãªã«ããã¨ã©ããMacã®Safari 6ã§ã¯ä¿®æ£ãããããã§ãã About the security content of Safari 6 http://support.apple.com/kb/HT5400 WebKit Available for: OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: Visiting a maliciously crafted
e-shops ã«ã¼ã (FAQ - ãããã質å) e-shops ã«ã¼ã ï¼ è²·ãç©ã«ã´ã«ã¤ãã¦ ï¼ ãã«ã´ã«å ¥ããããã¿ã³ãæ¼ãã¨ãã¯ãã¹ãµã¤ãã¹ã¯ãªãããé²æ¢ããããã«ããã®ãã¼ã¸ãå¤æ´ãã¾ããããã¨æ å ±ãã¼ã«è¡¨ç¤ºãããã®ã§ããã»ã»ã» ãã«ã´ã«å ¥ããããã¿ã³ãæ¼ãã¨ãã¯ãã¹ãµã¤ãã¹ã¯ãªãããé²æ¢ããããã«ããã®ãã¼ã¸ãå¤æ´ãã¾ããããã¨æ å ±ãã¼ã«è¡¨ç¤ºãããã®ã§ããã»ã»ã» ãã«ã´ã«å ¥ããããã¿ã³ãæ¼ã㨠ãã¯ãã¹ãµã¤ãã¹ã¯ãªãããé²æ¢ããããã«ããã®ãã¼ã¸ãå¤æ´ãã¾ãããã ã¨ã¨ã©ã¼ã表示ãããã®ã§ããã âç¾è±¡â ãµã¤ãä¸ã«è¨ç½®ãã¦ãããããã«å ¥ããããã¿ã³ãã¯ãªãã¯ããã¨ã æ°ã¦ã£ã³ãã¦ãç«ã¡ä¸ããããã¦ã£ã³ãã¦ä¸é¨ã®æ å ±ãã¼ã« ãInternet Explorerã¯ãã¯ãã¹ãµã¤ã ã¹ã¯ãªãããé²æ¢ããããã«ããã®ãã¼ã¸ãå¤æ´ãã¾ããã詳細ã«ã¤ãã¦ã¯ãããã¯ãªãã¯ãã¦ãã ããï¼ï¼
ã©ãã§ããªã¯ãã2013 ã«ã¯ãã¯ãã¹ãµã¤ãã¹ã¯ãªããã£ã³ã°ã®èå¼±æ§ãåå¨ãã¾ãã ã©ãã§ããªã¯ãã2013 ã¯ãGoogle Chrome ç¨ã®æ¡å¼µæ©è½ã§ããã©ãã§ããªã¯ãã2013 ã«ã¯ãã¯ãã¹ãµã¤ãã¹ã¯ãªããã£ã³ã°ã®èå¼±æ§ãåå¨ãã¾ãã ãã®èå¼±æ§æ å ±ã¯ãæ å ±ã»ãã¥ãªãã£æ©æè¦æãã¼ããã¼ã·ããã«åºã¥ãä¸è¨ã®æ¹ã IPA ã«å ±åããJPCERT/CC ãéçºè ã¨ã®èª¿æ´ãè¡ãã¾ããã å ±åè : æ±åå¤§å¦ å¤§å¦é¢æ å ±ç§å¦ç ç©¶ç§ èé ä¸å½¦ æ°
ææäºé Aä¸ã®(a)ã¯ãä»ãè¦ãªãã¦ããã»ãã¥ã¢ãå±æ§ã ã¨åããã¾ããã徳丸æ¬ï¼ä½ç³»çã«å¦ã¶ å®å ¨ãªWebã¢ããªã±ã¼ã·ã§ã³ã®ä½ãæ¹ï¼ã§ã¯ã4.8.2ã¯ããã¼ã®ã»ãã¥ã¢å±æ§ä¸å(P209)ã«èª¬æãããã¾ãã ææäºé Bã¯ãããã ãèªãã¨ãXSSã®ããã§ãããããµã¼ãã¼ãµã¤ãã®ã¹ã¯ãªããã¤ã³ã¸ã§ã¯ã·ã§ã³ã®ããã§ãããã¾ãããæ¤æ»ãã°ããXSSã§ãããã¨ããããã¾ãï¼ä¸å³ã¯IPAããã®å¼ç¨ï¼ãXSSã¯ã徳丸æ¬4.3.1ã¯ãã¹ãµã¤ãã¹ã¯ãªããã£ã³ã°ï¼åºæ¬ç·¨ï¼ã¨4.3.2ã¯ãã¹ãµã¤ãã¹ã¯ãªããã£ã³ã°ï¼çºå±ç·¨ï¼ã«ã¦èª¬æãã¦ãã¾ãã ããã¾ã§ã¯ãããåºæ¬çãªåé¡ã§ãããåé¡æP6ã«åºã¦ãã以ä¸ã®é¨åã¯ãå°ãã ãã²ãã£ã¦ã¾ããã ãã®ããã°ã©ã ã¯ãå©ç¨è ãå ¥åããæååããã¤ã¢ãã°ã«è¡¨ç¤ºããããã«ãåãåã£ããã©ã¡ã¿ã®å¤ãã¹ã¯ãªããã«åãè¾¼ã¿ãåçã«ã¹ã¯ãªãããçæãããå³4ã®(  c   )è¡ç®ã§ã¯
æ示ããªãã¦ãviewã§ã®åºåãHTMLã¨ã¹ã±ã¼ããã¦ãããã®ã§ç¡è¦æã«ãªã£ã¦ã html_escapeãã·ã³ã°ã«ã¯ã©ã¼ããã¨ã¹ã±ã¼ãããªãã¨ããèªèããªã viewã§javascriptãæ¸ãã¨ãã«åãè¾¼ãå¤ãescape_javascriptãã¦ãªã ãã®ãããã®è¦ç´ ãçµã¿åãããã¨XSSããã¾ããããã¨ãã話ãæ¸ãã¾ããããã£ã¦ã人ã«ã¨ã£ã¦ã¯ã¯ã½ã¿ãããªå 容ãªã®ã§èªãæéããã£ãããªãããããã¾ããããã¨ãã°js.erbã§ãããªãµãã«æ¸ãã¦ãã¨ã㦠var article_id = '<%= @article_id %>'; @article_idãä¿¡ç¨ã§ããå¤ã ã¨ããåæã ã¨åé¡ãªãã®ã§ãããcontroller㧠@article_id = params[:article][:id] å®ã¯ãããªãã¨ãã¦ãã ãã§ãã¨ã¯ç´ éãã£ã¦ãã人ããããããããããããããã¾ãããè¦ã¯å¤ãã渡
ChromeãSafariã«ã¯XSS AuditorãIE 8以ä¸ã«ã¯XSSãã£ã«ã¿ã¼ã¨ãããXSSãæ¤ç¥ãã¦ãããã¯ããæ©è½ãããããããã¾ãã ä»åã¯ããããåé¿ãã¦ã¿ãè¨é²ã§ãã ã»Chromeã§ãã¤ãã¹ ã¯ãï¼ã¤ããã¨ã¨ãå ±åãããã¤ã§ãï¼ XSS Auditor bypass with U+2028/2029 https://bugs.webkit.org/show_bug.cgi?id=78732 ãªããSafariã§ã¯ãããã¯ããã(ä¸ã®äººãçç±ãããããªãã¨è¨ã£ã¦ãã)ãã ãã©ãChromeã§ã¯åãã¾ãã以ä¸ã§è©¦ãã¦ã¿ã¦ãã ããã http://vulnerabledoma.in/char_test?charset=utf-8&xss=1&body=%3Cscript%3E//%E2%80%A8alert(1)%3C/script%3E http://vulnerabled
太ã£è ¹ãã¼ããããããä»å¹´ï¼å¹´éé ãããã®ã¯ã 01æ $1,000 Mapsã¨Blogsearchãå»å¹´XSSã£ãæã®æ®ãã®æ¯è¾¼ã 07æ $500 åã³Mapsã§XSSã 10æ Tã·ã£ã GDD2011JPåå Tã·ã£ãã¨ã¿ãæ¼é£¯ã 10æ Tã·ã£ã GDD2011JP DevQuizæºç¹Tã·ã£ã(åçå³)ã¨EXP Hackathonå¾ã®ã¿ãé æ親ä¼ã 11æ Tã·ã£ã Google Code Jam Japan 2011 200ä½ä»¥å è³åTã·ã£ã(åçå·¦)ãã§ï¼ãªãä¼ã¯ã©ããªã£ãï¼ ã¨ãã訳ã§ãã¼ããããããéåé ããªãVulnerability Reward Programãä¸çªå¹çããããã§ãã è¥ãã³ã¼ãã¼ã®çããã徳丸æ¬ã§ãèªãã§ãã£ã¬ã³ã¸ãã¦ã¿ã¦ã¯ï¼ ä½ç³»çã«å¦ã¶ å®å ¨ãªWebã¢ããªã±ã¼ã·ã§ã³ã®ä½ãæ¹ èå¼±æ§ãçã¾ããåçã¨å¯¾çã®å®è·µ ä½è : 徳丸浩åºç社/ã¡ã¼ã«ã¼: SB
ã¯ãã¹ãµã¤ãã¹ã¯ãªããã«ã¤ãã¦ã 楽天ã§è²·ãç©ããããã®ã§ãããååã®ãã¼ã¸ã«è¡ã㨠ãã¯ãã¹ãµã¤ãã¹ã¯ãªãããé²æ¢ããããã«ãã®ãã¼ã¸ãå¤æ´ãã¾ãããã¨åºã¦ãã¾ãã ã¯ãã¹ãµã¤ãã¹ã¯ãªããã«ã¤ãã¦ã 楽天ã§è²·ãç©ããããã®ã§ãããååã®ãã¼ã¸ã«è¡ã㨠ãã¯ãã¹ãµã¤ãã¹ã¯ãªãããé²æ¢ããããã«ãã®ãã¼ã¸ãå¤æ´ãã¾ãããã¨åºã¦ãã¾ãã ãã£ããããååãè¦ã¤ããã®ã§ãã©ããã¦ãè³¼å ¥ãããã§ãã ï¼ååã¨è¨ãã®ã¯ãã¯ã³ã¡ããã®å¯æãæã§ãï¼ ã©ããããããã§ããããï¼ è³¼å ¥ãããã¨ã¯ã§ããªãã®ã§ããããï¼ ãããã«ããã¾ã§è©³ãããªããã®ã§â¦ ã¯ãã¹ãµã¤ãã¹ã¯ãªããã¨ãããã¨ã«ã¤ãã¦ãåããããããé¡ããã¾ãï¼
ãã¼ã«ã«ã¢ããªã±ã¼ã·ã§ã³ã«ããã(1) å¤æ°ã®ã¿ããéãããæ¨çã®ãã¡ã¤ã³ã¸ã® URI ãç¾å¨ã®ã¿ãã«èªã¿è¾¼ã¾ãããã¾ã㯠(2) UI ã®ãã©ã¼ã«ã¹ãæ¨çã®ãã¡ã¤ã³ã«ããã¨ããæ¨çãã¡ã¤ã³ã® URI ã¨æªæã®ãã Javascript ã¨ããé£ç¶ãã2ã¤ã® startActivity é¢æ°ã³ã¼ã«ãä½ããããã¨ã§ããµã³ãããã¯ã¹ãåé¿ããããããã³ãä»»æã®ãã¡ã¤ã³ã«ããã¦ä»»æã® Javascript ãå®è¡ãããå¯è½æ§ãããã¾ãã
æ¨æ¥ã®æ¥è¨ã®ç¶ãã§ãAjaxã«åºæãªã»ãã¥ãªãã£åé¡ã«ã¤ãã¦æ¤è¨ãã¾ããä»åã¯JSONçã®æ³å®å¤èªã¿åºãã«ããæ»æã§ãããããæ»æææ³ã¯æ¬æ¥ãã©ã¦ã¶å´ã§å¯¾å¿ãã¹ããã®ã§ããããå¾ãWebã¢ããªã±ã¼ã·ã§ã³å´ã§å¯¾å¿ããä¸ã§ãã¾ã å®çªã¨ãªã対çããªãããã«æãã¾ãããã®ãããè¤æ°ã®åè£ã示ãããã¨ã§è°è«ã®ãã£ããã«ãããã¨æãã¾ãã ã¾ããä½ããªããåºç¤ããå¦ã¶PHPã«ããWebã¢ããªã±ã¼ã·ã§ã³å ¥éXAMPP/jQuery/HTML5ã§ä½ãã¤ãããã®WeãããAjaxãå©ç¨ããã¢ããªã±ã¼ã·ã§ã³ã®æ¦å¿µå³ãå¼ç¨ãã¾ãï¼åæ¸P20ã®å³1-23ï¼ã ååãåã åã¯ã(5)ã®HTTPã¬ã¹ãã³ã¹ã®åå¾ã§ãJSONçã®ãã¼ã¿ä½æï¼ã¨ã³ã³ã¼ãï¼ã«èµ·å ããevalã¤ã³ã¸ã§ã¯ã·ã§ã³ãã(5)ã®ã¬ã¹ãã³ã¹ãåãåã£ãå¾ã®HTMLã¬ã³ããªã³ã°ã®éã®XSSã«ã¤ãã¦èª¬æãã¾ããã ããããåé¡ã¯ããã ãã§ã¯ããã¾ãããæ£å¸¸
æ¨æ¥ã®æ¥è¨ã®ç¶ãã§ãAjaxã«åºæãªã»ãã¥ãªãã£åé¡ã«ã¤ãã¦æ¤è¨ãã¾ããã¿ã¤ãã«ã¯XSSã¨ãªã£ã¦ãã¾ãããä»åç´¹ä»ããèå¼±æ§ã¯XSSã§ã¯ããã¾ããã ä½ããªããåºç¤ããå¦ã¶PHPã«ããWebã¢ããªã±ã¼ã·ã§ã³å ¥éXAMPP/jQuery/HTML5ã§ä½ãã¤ãããã®WeãããAjaxãå©ç¨ããã¢ããªã±ã¼ã·ã§ã³ã®æ¦å¿µå³ãå¼ç¨ãã¾ãï¼æ¬æ¸P20ã®å³1-23ï¼ã Ajaxã®ã¢ããªã±ã¼ã·ã§ã³ã§ã¯ãXMLHttpRequestã¡ã½ããçã§ãã¼ã¿ãè¦æ±ãããµã¼ãã¼ã¯XMLãJSONãã¿ãåºåãæååãªã©é©å½ãªå½¢å¼ã§è¿ãã¾ãããã©ã¦ã¶å´JavaScriptã§ã¯ããã¼ã¿å½¢å¼ããã³ã¼ããã¦ããã¾ãã¾ãªå¦çã®å¾ãHTMLã¨ãã¦è¡¨ç¤ºãã¾ãã以ä¸ã«ãAjaxã®ãªã¯ã¨ã¹ãããµã¼ãã¼ã«å±ããå¾ã®å¦çã®æµãã説æãã¾ãã ãµã¼ãã¼å´ã§ãã¼ã¿ãä½æãåå¾ ãã¼ã¿ä¼éç¨ã®å½¢å¼ï¼XMLãJSONãã¿ãåºåãæååçï¼ã«ã¨ã³ã³ã¼ã
å æ¥ãTwitterã§ã©ã®ããã«èå¼±æ§ãè¦ã¤ãããã«èå³ãããã ãããã¨æ¸ããããæå¤ã«è²ã ãªäººããåå¿ããã£ãã®ã§ãããã¾ã§ã«èªåãè¦ã¤ããèå¼±æ§ã®ããã¤ãã«ã¤ãã¦ã©ãããçµç·¯ã§è¦ã¤ããã®ãã¡ãã£ã¨æ¸ãã¦ã¿ã¾ãã JVN#89344424: è¤æ°ã®ã¡ã¼ã«ã¯ã©ã¤ã¢ã³ãã½ããã«ããããæ·»ä»ãã¡ã¤ã«ã«ããã¡ã¼ã«ã¯ã©ã¤ã¢ã³ãã½ããã使ç¨ä¸è½ã«ãªãèå¼±æ§ ããã¯ãæ·»ä»ãã¡ã¤ã«åã«Unicodeã®åè¨å·ãå«ãã¦ããã¨ãã¡ã¼ã©å´ã§Shift_JISã«å¤æããéã«ããã¯ã¹ã©ãã·ã¥ã«å¤æããã¦ãã¾ã£ã¦æ³å®å¤ã®ãã£ã¬ã¯ããªã«æ·»ä»ãã¡ã¤ã«ãå±éããã¦ãã¾ã£ããããããã¯ã©onãã®ãããªååã®ãã¡ã¤ã«ãæ·»ä»ãã¦ãããã¨ã§Shift_JISã«å¤æãã¦CONã¨ãããã¡ã¤ã«ãéããã¨ãã¦ã¡ã¼ã©ãåºã¾ã£ã¦ãã¾ãã¨ããåé¡ã§ããããã¯ãç§èªèº«ãæåã³ã¼ãã®åé¡ã«ã¤ãã¦èª¿ã¹å§ããåæ段éã§ãUnicodeããã®å¤æã§åé¡
ã½ã¼ã·ã£ã«ã¡ãã£ã¢æ代ã®èå¼±æ§å ±å 2011å¹´05æ27æ¥22:28 ãã¤ã¼ã mikko_hypponen ãã«ã·ã³ãçºÂ byï¼ããã³ã»ããããã³ æ¨æ©ãå¤ãé»åã¡ã¼ã«ãæ¢ãã¦ãã¦ã以ä¸ã®å¥å¦ãªããããè¦ã¤ããï¼ ã¦ã¼ã¢ã¢ã®ã»ã³ã¹ãæã¤èª°ãããã¡ã¼ã«ã®ãããã«XSSã¸ã§ã¼ã¯ãæ¿å ¥ããã®ã ã é¢ç½ãã¨æã£ãã®ã§ããã®ãã¨ã«ã¤ãã¦Twitterã«æ稿ããï¼ æ°åå¾ãç§ã¯Robin Jacksonã以ä¸ã®ããã«ãªãã©ã¤ãã¦ããã®ã«æ°ã¥ããï¼ ããå¾ãªãããã¤ã¼ãããã¹ã¯ãªãããã¿ã°ãå«ãã§ããããã¨ãã£ã¦ãJavascriptãå®è¡ããTwitterã¯ã©ã¤ã¢ã³ãã¯ç¡ãã æ¬å½ã§ãããã¨ã示ããããRobinã¯ã¹ã¯ãªã¼ã³ã·ã§ãããæ稿ãã¦ãããã å½¼ã使ç¨ãã¦ããã¯ã©ã¤ã¢ã³ãã¯ãChromeç¨ã®Tweetdeckã ã£ããéçºè ã«å ±ããªãã¦ã¯ãããã¦ãã¡ãããå½¼ããTwitterä¸ã«ããã Tw
è¦ããã«ã解決ãããã¾ã§ã¯ãã°ã¢ã¦ããã¨ãã¨ãããã¨ã ãããã¹ã ã2011/04/20 12:20 追è¨ãã²ãã£ã¯ã¼çãªãã¾ãã追å ãã¾ããã ã2011/04/20 00:30 追è¨ãå¤åããã§æå¾ã以é㯠Evernote ã®æ£å¼çºè¡¨ãå¾ ã£ãä¸ã§ããããä¿¡ç¨ãã¦å©ç¨ãããã©ããã¯åå人ã®å¤æã«ãä»»ããã¾ãã ã2011/04/19 17:05 追è¨ãåå¾ã®é¨è¿½è¨ããªããã¨ã³ããªãèµ·ãããã¦ããæ¹ãããã¾ããã®ã§ãç´¹ä»ãï¼ãbulkneetsæ°ã«ãã£ã¦å ±åãããEvernoteã®XSSèå¼±æ§ã¨ã¯ å±éºã¨å¯¾çã( http://d.hatena.ne.jp/pichikupachiku/20110419/1303158373 ) ç¶ããèªã
Internet Explorer ã«ã¯ããã¡ã¤ã«å¤å¥å¦çã«èµ·å ããã¯ãã¹ãµã¤ãã¹ã¯ãªããã£ã³ã°ã®èå¼±æ§ãåå¨ãã¾ãã Windows XP SP3 ä¸ã® Internet Explorer 6 Windows XP x64 Edition SP2 ä¸ã® Internet Explorer 6 Windows XP SP3 ä¸ã® Internet Explorer 7 Windows XP x64 Edition SP2 ä¸ã® Internet Explorer 7 Windows Vista SP1 ããã³ SP2 ä¸ã® Internet Explorer 7 Windows Vista x64 Edition SP1 ããã³ Windows Vista x64 Edition SP2 ä¸ã® Internet Explorer 7 Windows XP SP3 ä¸ã® Internet E
Movable Type 4 ããã³ Movable Type 5 ã§ç¢ºèªãããè¤æ°ã®ã»ãã¥ãªãã£åé¡ã®ä¿®æ£ãã¼ã¸ã§ã³ã¨ãã¦ã Movable Type 4.28 ããã³ Movable Type 5.04 ã®æä¾ãéå§ãããã¾ããMovable Type 4 ããã³ Movable Type 5 ã®ãã¹ã¦ã®ãã¼ã¸ã§ã³ã®ãä¿®æ£çã¸ã®ã¢ããã°ã¬ã¼ããå¼·ãæ¨å¥¨ãã¾ãã æ¦è¦ Movable Type 5.031 ããã³ 4.27 ãå«ã以åã®ãã¼ã¸ã§ã³ã§ã¯ãã¢ããªã±ã¼ã·ã§ã³ä¸ã®å ¥åé ç®ã®ä¸é¨ã«ããã¦ãé©åã«å ¥åã¨ã¹ã±ã¼ãå¦çãããªããããã¯ãã¹ãµã¤ãã¹ã¯ãªããã£ã³ã°ï¼XSSï¼ããã³ SQLã¤ã³ã¸ã§ã¯ã·ã§ã³ãçºçããå¯è½æ§ãããã¾ãã æ³å®ãããå½±é¿ é éã®ç¬¬ä¸è ã«ãããå½è©²è£½åã§ç®¡çãã¦ããæ å ±ãé²è¦§ãããããå¤æ´ããããããå¯è½æ§ãããã¾ããã¾ããé éã®ç¬¬ä¸è ãç¹å®ã®æä½ããããªããã¨ã§ãã¦
ã¯ã¦ãªã°ã«ã¼ãã®çµäºæ¥ã2020å¹´1æ31æ¥(é)ã«æ±ºå®ãã¾ãã 以ä¸ã®ã¨ã³ããªã®éããä»å¹´æ«ãç®å¦ã«ã¯ã¦ãªã°ã«ã¼ããçµäºäºå®ã§ããæ¨ããç¥ãããã¦ããã¾ããã 2019å¹´æ«ãç®å¦ã«ãã¯ã¦ãªã°ã«ã¼ãã®æä¾ãçµäºããäºå®ã§ã - ã¯ã¦ãªã°ã«ã¼ãæ¥è¨ ãã®ãã³ãæ£å¼ã«çµäºæ¥ã決å®ãããã¾ããã®ã§ã以ä¸ã®éãã確èªãã ããã çµäºæ¥: 2020å¹´1æ31æ¥(é) ã¨ã¯ã¹ãã¼ãå¸æç³è«æé:2020å¹´1æ31æ¥(é) çµäºæ¥ä»¥éã¯ãã¯ã¦ãªã°ã«ã¼ãã®é²è¦§ããã³æ稿ã¯è¡ãã¾ãããæ¥è¨ã®ã¨ã¯ã¹ãã¼ããå¿ è¦ãªæ¹ã¯ä»¥ä¸ã®è¨äºã«ãããã£ã¦æç¶ãããã¦ãã ããã ã¯ã¦ãªã°ã«ã¼ãã«æ稿ãããæ¥è¨ãã¼ã¿ã®ã¨ã¯ã¹ãã¼ãã«ã¤ã㦠- ã¯ã¦ãªã°ã«ã¼ãæ¥è¨ ãå©ç¨ã®ã¿ãªãã¾ã«ã¯ãè¿·æãããããããã¾ãããã©ãããããããé¡ããããã¾ãã 2020-06-25 è¿½è¨ ã¯ã¦ãªã°ã«ã¼ãæ¥è¨ã®ã¨ã¯ã¹ãã¼ããã¼ã¿ã¯2020å¹´2æ28
å æ¥ããªããªãå¼·çãªXSSæ»æææ³ãå ¬éããã¦ãã¾ããã DNSã¸ã®åãåããçµæã«JavaScriptãåãè¾¼ãã§ãã¾ããã¨ãããã®ã§ãã SkullSecurity: Stuffing Javascript into DNS names DarkReading: Researcher Details New Class Of Cross-Site Scripting Attack nCircle: Meta-Information Cross Site Scripting (PDF) èªåçæãããWebãã¼ã¸ä¸ã«ãDNSã«ããåå解決çµæãã¨ã¹ã±ã¼ããããªãç¶æ ã§å«ã¾ãã¦ããã¨ãJavaScriptãå®è¡ããã¦ãã¾ãã¨ããä»æãã§ãã ãhogehoge.example.comããæ¬æ¥ãªãã°ã198.1.100.3ãã¨ãããããªIPã¢ãã¬ã¹ãçµæã¨ãã¦è¿ãã¨ããããDNSã«ç´°å·¥ãè¡ã£
NTTãã³ã¢ã¨ã½ãããã³ã¯ã¢ãã¤ã«ã¯ããã£ã¼ãã£ã¼ãã©ã³ï¼ããããã¬ã©ã±ã¼ï¼ã«ã¦JavaScriptã®å¯¾å¿ãå§ãã¦ãã¾ããJavaScriptã«å¯¾å¿ããã¨ãã¯ãã¹ãµã¤ãã»ã¹ã¯ãªããã£ã³ã°(XSS)èå¼±æ§ã®æ¸å¿µãé«ã¾ãã¾ããã両社ã¯ç¬èªã®ææ³ã«ããXSS対çããã¦ããï¼ãããã¨ãã¦ããï¼æåã観測ããã¾ããã®ã§å ±åãã¾ãããã®å 容ã¯ããªã¬æ¨æºJavaScriptåå¼·ä¼ã§ãã¿ã¨ãã¦ä½¿ã£ããã®ã§ãã NTTãã³ã¢ã«å¦ã¶ãXSS対çãã¾ãããµã³ãã«ã¨ãã¦ä»¥ä¸ã®ãããªXSSèå¼±ãªã¹ã¯ãªãããç¨æãã¾ãã <?php session_start(); ?> <body> ããã«ã¡ã¯<?php echo $_GET['p']; ?>ãã </body>ããã以ä¸ã®URLã§èµ·åããã¨ãIE7ã§ã¯ä¸å³ã®ãããªè¡¨ç¤ºã«ãªãã¾ãã []http://example.com/xss01.php?p=å±±ç°<scrip
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}