From klaus.mailinglists@pernau.at Thu Oct 18 09:38:58 2007 From: Klaus Darilion To: sr-users@lists.kamailio.org Subject: Re: [OpenSER-Users] sanitizing sip requests Date: Thu, 18 Oct 2007 09:47:52 +0200 Message-ID: <47170FA8.3000409@pernau.at> In-Reply-To: <471634B2.10408@employees.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============0878423980==" --===============0878423980== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable William Quan schrieb: > Hi all, > I came across a security alert that basically embeds javascript in the > display name of the From to initiate cross-site-scripting (XSS) attacks. > Here is an example: >=20 > From: """user" > >;tag=3D002a000c Thats a cool attack. I fear there will be more smart attacks in the next=20 time. klaus > Grammatically , I don't see an issue with this. However, under the right > circumstances this could get ugly. > Do you see value in having openser take a proactive role to detect these > and reject calls? Or is this outside the scope of what a proxy should > be doing (leave it to the UA to sanitize) ? >=20 > Looking to get your thoughts- > -will >=20 > _______________________________________________ > Users mailing list > Users(a)openser.org > http://openser.org/cgi-bin/mailman/listinfo/users --===============0878423980==--