J-Novel Club
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Users

    You are on the cloned forums!

    Cross-site scripting attack concern warning

    Support
    3
    6
    327
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Prometheus0000
      Prometheus0000 Premium Member last edited by

      When I middle-click on the unreleased chapter for Tearmoon Empire (Manga) ch3, I get presented with this warning from my noscript extension:

      NoScript XSS Warning

      NoScript detected a potential Cross-Site Scripting attack

      from https://j-novel.club to https://js.stripe.com.

      Suspicious data:

      (URL) https://js.stripe.com/v3/m-outer-6262077c14f753400d607dc30e70f1af.html#url=https://j-novel.club/series/tearmoon-empire-manga#volume-1&title=Tearmoon Empire (Manga) (Manga) | J-Novel Club&referrer=https://j-novel.club/calendar?restrict=followed&muid=43ba83ff-c9e8-4442-907a-0851557ba77a0ba494&sid=547305ea-c96b-4f75-a062-66fc374342d4ac4d1c&version=6&preview=false

      I'm not sure there's anything to worry about, but this shouldn't happen at least.

      Actually it happens when I refresh the https://j-novel.club/series/tearmoon-empire-manga#volume-1 page. I don't own it BTW.

      chocolatkey 1 Reply Last reply Reply Quote 0
      • chocolatkey
        chocolatkey Staff @Prometheus0000 last edited by

        @Prometheus0000 this is nothing serious, it's just Stripe code that deals with fraud detection. We inherently trust Stripe's code running on our site in order to operate, so any potential XSS attacks can be disregarded.

        Prometheus0000 1 Reply Last reply Reply Quote 0
        • Prometheus0000
          Prometheus0000 Premium Member @chocolatkey last edited by

          @chocolatkey That's what I figured, but that doesn't mean that the warning should be showing up, since it doesn't normally. Presumably there's something in the site coded wrong, or it wouldn't show up.

          chocolatkey 1 Reply Last reply Reply Quote 0
          • chocolatkey
            chocolatkey Staff @Prometheus0000 last edited by

            @Prometheus0000 I am almost certain what you are seeing based on the logs is out of our hands, as it is due to logic in Stripe's own javascript code. I doubt that Stripe's own code has a bug this obvious, and even if it hypothetically did, it would be extremely tedious for us to alter the functions of Stripe's code. If you still believe something is amiss, we can continue this in an email to support@j-novel.club, where you can provide more screenshots and network request logs

            1 Reply Last reply Reply Quote 0
            • chocolatkey
              chocolatkey Staff last edited by chocolatkey

              To elaborate a bit on why NoScript is worried, I think that based on the message from your plugin, NoScript thinks, most likely due to the URL query parameters in https://js.stripe.com/v3/m-outer-6262077c14f753400d607dc30e70f1af.html#url=https://j-novel.club/series/tearmoon-empire-manga#volume-1&title=Tearmoon Empire (Manga) (Manga) | J-Novel Club&referrer=https://j-novel.club/calendar?restrict=followed&muid=43ba83ff-c9e8-4442-907a-0851557ba77a0ba494&sid=547305ea-c96b-4f75-a062-66fc374342d4ac4d1c&version=6&preview=false, that we are injecting untrusted code of our own into Stripe's payment frame. This is not true, and if it were it would be a colossal failure on Stripe's end. NoScript's heuristics are producing a false-positive

              Shiny 1 Reply Last reply Reply Quote 0
              • Shiny
                Shiny Premium Member @chocolatkey last edited by Shiny

                It looks like Roll20 produces a similar warning: https://www.reddit.com/r/Roll20/comments/hj08nd/stripecom_crosssite_scripting_attack - seems like it's just NoScript not having a proper whitelist for legitimate cross site scripting use cases.

                The only thing I wonder is if there is a setting in https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy which could tell NoScript that the behaviour is acceptable. It might need to be at the Stripe end though which is beyond JNC's control.

                Stay shiny, y'all.

                1 Reply Last reply Reply Quote 0
                • 1 / 1
                • First post
                  Last post