The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


In the majority of cases, client-side validation of user input has beneficial



Download 5,76 Mb.
Pdf ko'rish
bet196/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   192   193   194   195   196   197   198   199   ...   875
Bog'liq
3794 1008 4334

In the majority of cases, client-side validation of user input has beneficial

effects on the application’s performance and the quality of the user experience.

For example, when filling out a detailed registration form, an ordinary user

might make various mistakes, such as omitting required fields or formatting

their telephone number incorrectly. In the absence of client-side validation,

correcting these mistakes may entail several reloads of the page, and round-

trip messages to the server. Implementing basic validation checks on the client

side makes the user’s experience much smoother and reduces the load on the

server.

Disabled Elements

If an element on an HTML form is flagged as disabled, it appears on-screen but

is usually grayed out and is not editable or usable in the way an ordinary con-

trol is. Also, it is not sent to the server when the form is submitted. For exam-

ple, consider the following form:


Product:

A217S”>

Quantity:








This includes the name of the product as a disabled text field and appears on-

screen as shown in Figure 5-5.

Figure 5-5:  A form containing a disabled input field

The behavior of this form is identical to the original example: the only para-

meters submitted are 

quantity


and 

price


. However, the presence of a dis-

abled field suggests that this parameter may originally have been used by the

application. Earlier versions of the form may have included a hidden or

editable field containing the product name. This would have been submitted

to the server and may have been processed by the application. Modifying the

name of the product may not appear to be as promising an attack as modify-

ing its price. However, if this parameter is processed, then it may be vulnera-

ble to many kinds of bugs such as SQL injection or cross-site scripting, which

are of interest to an attacker.


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   192   193   194   195   196   197   198   199   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish