Portée | Impact | Probabilité |
---|---|---|
Confidentiality Integrity Availability | Read Application Data, Execute Unauthorized Code or Commands |
Références | Description |
---|---|
CVE-2002-0938 | XSS in parameter in a link. |
CVE-2002-1495 | XSS in web-based email product via attachment filenames. |
CVE-2003-1136 | HTML injection in posted message. |
CVE-2004-2171 | XSS not quoted in error page. |
Use and specify an output encoding that can be handled by the downstream component that is reading the output. Common encodings include ISO-8859-1, UTF-7, and UTF-8. When an encoding is not specified, a downstream component may choose a different encoding, either by assuming a default encoding or automatically inferring which encoding is being used, which can be erroneous. When the encodings are inconsistent, the downstream component might treat some character or byte sequences as special, even if they are not special in the original encoding. Attackers might then be able to exploit this discrepancy and conduct injection attacks; they even might be able to bypass protection mechanisms that assume the original encoding is also being used by the downstream component.
The problem of inconsistent output encodings often arises in web pages. If an encoding is not specified in an HTTP header, web browsers often guess about which encoding is being used. This can open up the browser to subtle XSS attacks.
CAPEC-ID | Nom du modèle d'attaque |
---|---|
CAPEC-18 | XSS Targeting Non-Script Elements This attack is a form of Cross-Site Scripting (XSS) where malicious scripts are embedded in elements that are not expected to host scripts such as image tags ( |
CAPEC-193 | PHP Remote File Inclusion In this pattern the adversary is able to load and execute arbitrary code remotely available from the application. This is usually accomplished through an insecurely configured PHP runtime environment and an improperly sanitized "include" or "require" call, which the user can then control to point to any web-accessible file. This allows adversaries to hijack the targeted application and force it to execute their own instructions. |
CAPEC-32 | XSS Through HTTP Query Strings An adversary embeds malicious script code in the parameters of an HTTP query string and convinces a victim to submit the HTTP request that contains the query string to a vulnerable web application. The web application then procedes to use the values parameters without properly validation them first and generates the HTML code that will be executed by the victim's browser. |
CAPEC-86 | XSS Through HTTP Headers An adversary exploits web applications that generate web content, such as links in a HTML page, based on unvalidated or improperly validated data submitted by other actors. XSS in HTTP Headers attacks target the HTTP headers which are hidden from most users and may not be validated by web applications. |
Nom | Organisation | Date | Date de publication | Version |
---|---|---|---|---|
PLOVER | Draft 3 |
Nom | Organisation | Date | Commentaire |
---|---|---|---|
Sean Eidemiller | Cigital | added/updated demonstrative examples | |
Eric Dalci | Cigital | updated Time_of_Introduction | |
KDM Analytics | added/updated white box definitions | ||
CWE Content Team | MITRE | updated Relationships, Taxonomy_Mappings, Weakness_Ordinalities | |
CWE Content Team | MITRE | updated Description | |
CWE Content Team | MITRE | updated Demonstrative_Examples, Description, Name | |
KDM Analytics | Improved the White_Box_Definition | ||
CWE Content Team | MITRE | updated White_Box_Definitions | |
CWE Content Team | MITRE | updated Demonstrative_Examples, Description, Name, Potential_Mitigations | |
CWE Content Team | MITRE | updated Description, Potential_Mitigations | |
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated Related_Attack_Patterns, Relationships | |
CWE Content Team | MITRE | updated Potential_Mitigations | |
CWE Content Team | MITRE | updated Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Potential_Mitigations, Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Applicable_Platforms, Causal_Nature, Likelihood_of_Exploit, Relationships, White_Box_Definitions | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Potential_Mitigations | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Description | |
CWE Content Team | MITRE | updated Detection_Factors, Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes |