Jump to content

xss question


mikefrederick

Recommended Posts

The biggest issue is usually user-inputted data that is eventually echo'ed from the server to other clients. Forum signatures, profiles ect.

 

The idea is if they can inject client side scripting, they can pretty much maks your site, or change certain elements (ie form actions, ect) to capture data.

 

Any data inputted by a user that will eventually be echo'ed back to clients is vulnerable. One quick and easy solution is htmlentities() or a sanitization script like this one http://htmlpurifier.org/

Link to comment
Share on other sites

XSS is done utilising javascript (in most cases i'm aware of). Basically if someone is able to insert javascript into your pages (via form submission or otherwise) they can execute commands as the user that is currently utilising the site. i.e. make a form submission, change someone's profile information, send sensitive details to their own server. All bad, google it for more info.

Link to comment
Share on other sites

XSS also takes the form of server side code injection (assuming that you are not validating all external data), where your code uses an include() statement with a parameter from the end of the url as the file to be included and someone appends a url to their page that outputs raw/unparsed php code that is then executed on your server or if your do something like put external data through the eval() function. This can also take the form of user supplied input that contains raw php code that you save into a file ending in .php and then that file is browsed to... or you have an upload function that allows a .php file to be uploaded and then browsed to... Just a few of the possible ways someone can put or run his script on your server.

Link to comment
Share on other sites

This thread is more than a year old. Please don't revive it unless you have something important to add.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.