I have migrated several XSS attacks to my site. The following HTML snippet is an XSS vector that was introduced by an attacker:
<a href="mailto:"> <a href=\"http://www.google.com onmouseover=alert(/hacked/); \" target=\"_blank\"> <img src="http://www.google.com onmouseover=alert(/hacked/);" alt="" /> </a></a>
It seems that the script should not be executed, but with the help of the IE9 development tool, I was able to see that the browser translates HTML to the following:
<a href="mailto:"/> <a onmouseover="alert(/hacked/);" href="\"http://www.google.com" target="\"_blank\"" \?=""> </a/>
After some testing, it turns out that "makes" onmouseover "an attribute of" live ", but I donβt know why. Does anyone know why this vector succeeds?
opps source share