Hello:
I am really trying to understand XSS attacks and can't seem to wrap my head around it, I would rather seem like a fool than program like one with holes in it. My problem is understanding how an attack occurs. Let's say Mary logs into the system and creates a record in the table via an html form. I have php filters and validation for the data before it actually goes into mysql table. My question is how does John attack my website? Or more important, how does he actually change files? If he were to have a log in and gains access because it doesn't take much to register, how? Is it a matter of the filter being bad and his XSS scipt is in a record and when someone open/views that record (field) the script is launched? I have read lots on how the javascript, for example, is placed in the url or form fields but nothing explains whether the information is saved and launched via the record stored in the database.
Understanding XSS Attacks ...
Moderator: General Moderators
-
pepe_lepew1962
- Forum Commoner
- Posts: 44
- Joined: Thu Nov 20, 2008 10:29 am
- social_experiment
- DevNet Master
- Posts: 2793
- Joined: Sun Feb 15, 2009 11:08 am
- Location: .za
Re: Understanding XSS Attacks ...
“Don’t worry if it doesn’t work right. If everything did, you’d be out of a job.” - Mosher’s Law of Software Engineering
- php3ch0
- Forum Contributor
- Posts: 212
- Joined: Sun Nov 13, 2005 7:35 am
- Location: Folkestone, Kent, UK
Re: Understanding XSS Attacks ...
Imagine that someone entered this into their firstname
if you then displayed the firestname on the website it would be able to run the script (possibly from even an external source)
Code: Select all
<script>alert('Hello'); </script>-
pepe_lepew1962
- Forum Commoner
- Posts: 44
- Joined: Thu Nov 20, 2008 10:29 am
Re: Understanding XSS Attacks ...
Ok, so I am understanding it correctly that the attack is actually thru the record/field and my protection is with filters and sanitizing the information BEFORE it goes into the table and htmlcharacters output???
- php3ch0
- Forum Contributor
- Posts: 212
- Joined: Sun Nov 13, 2005 7:35 am
- Location: Folkestone, Kent, UK
Re: Understanding XSS Attacks ...
The other thing to consider is SQLInjection someone inserts sql into your script to modify the database. More information can be found here http://www.unixwiz.net/techtips/sql-injection.html