[OpenSER-Users] sanitizing sip requests

William Quan wiquan at employees.org
Wed Oct 17 18:13:38 CEST 2007


Hi all,
I came across a security alert that basically embeds javascript in the
display name of the From to initiate cross-site-scripting (XSS) attacks.
Here is an example:

From: "<script>alert('hack')</script>""user"
<sip:user at domain.com <https://lists.grok.org.uk/mailman/listinfo/full-disclosure>>;tag=002a000c


Grammatically , I don't see an issue with this. However, under the right
circumstances this could get ugly.
Do you see value in having openser take a proactive role to detect these
and reject calls?  Or is this outside the scope of what a proxy should
be doing (leave it to the UA to sanitize) ?

Looking to get your thoughts-
-will




More information about the Users mailing list