Skip to content

A threat actor may inject malicious content into HTTP requests. The content is not reflected in the HTTP response and executed in the victim's browser.

License

Notifications You must be signed in to change notification settings

qeeqbox/dom-based-cross-site-scripting

Repository files navigation

A threat actor may inject malicious content into HTTP requests. The content is not reflected in the HTTP response and executed in the victim's browser.

Example #1

  1. Threat actor crafts an email with a malicious request to a vulnerable target and sends the email to a victim
  2. The victim clicks on the email and sends the request to the vulnerable target
  3. The target sends the malicious code back to the victim
  4. The victim's browser inserts the malicious code
  5. When malicious code gets executed, it calls back the threat actor

Impact

Vary

Risk

  • Read & modify data

Redemption

  • Client input validation
  • Output encoding
  • Browser built-in XSS preveiton

ID

cb251c97-067d-4f13-8195-4f918273f41b

References

About

A threat actor may inject malicious content into HTTP requests. The content is not reflected in the HTTP response and executed in the victim's browser.

Topics

Resources

License

Code of conduct

Stars

Watchers

Forks

Sponsor this project