CLP-01-001 DOMXSS in Clipperz Bookmarklet via benign HTML Injection (Medium) Insecure concatenation of HTML strings in the Clipperz bookmarklet core lead to possibilities for an attacker, to turn a harmless injection on a victim website into an XSS as soon as a user activates the bookmarklet. The bookmarklet contains injectable code that allows arbitrary JavaScript execution from a harmless injection as shown below: PoC: (run Clipperz Bookmarklet on this website)
Affected HTML: ", "value": "k4n0n3!?"}]}, "version": "0.2.3"} Affected Code: innerHTML+="";} ... sj=function(o){var objtype=typeof(o);if(objtype=="number"||objtype=="boolean"){return o+"";}else if(o===null){return"null";} if(objtype=="string"){return rs(o);} var me=arguments.callee;if(objtype!="function"&&typeof(o.length)=="number"){var res=[];for(var i=0;i