[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Cross site scripting explained
Those papers are by Endler and Zeno...they should get
you informed. If you don?t feel like reading, I'll try
to sum up the basic concepts for you and everybody else.
In general there are two types of XSS attacks,
transient and permanent.
Lets say you have an E-commerce site named example.com.
Example.com uses their own type of session cookie to
maintain state when a customer makes transactions. An
example of a transient attack would be if I knew bob
currently has the example.com cookie on his system. If
I sent an IM to bob with a link that was specially
crafted w/ an XSS attack payload that sent bob?s
example.com cookie to a cookie collecting script at
bobs-evil-wife.com. So now bob?s wife can use his
cookie to session hijack his example.com account and do
what she pleases on bob?s account.
Ok now lets say I have a message board, I want users to
make colorful posts so I allow HTML to be put into
posts, but I unfortunately I allowed everything
inserts script into a post that when loaded,
automatically posts "I am a luser" to every message
board on the site, or it could do anything else the
evil user wants to do on behalf of all the visitors
that loaded the site up and were members of the board.
Here are examples from this month of XSS attacks:
Sadly this type of hole is extremly easy to find in any
non-trival website...I've found hundreds all over
major sites on the web. The developers just don't care
much about them though because the second part of the
attack, the user interaction, is difficult to
accomplish. There has been much debate regarding if
these types of vulns should be allowed on bugtraq. IMHO
the disclosure of these types of attacks should be
"moved" to webappsec list.
-Slow2Show- <-- graduating Friday woo hoo!!
University of Florida
>Can anyone explain to me or point me to a paper that
>what cross site scripting is, and how it could be
>problems for someone? Thanks.