For each potential XSS vulnerability noted in the previous steps:
■
Review the HTML source to identify the location(s) of your unique string.
■
If the string appears more than once, then each occurrence needs to be
treated as a separate potential vulnerability and investigated individually.
■
Determine, from the location within the HTML of the user-controllable
string, how you need to modify it in order to cause execution of arbitrary
JavaScript. Typically, numerous different methods will be potential vehi-
cles for an attack.
■
Attempt to use the various injection vectors described, and consult the
XSS Cheat Sheet at
http://ha.ckers.org/xss.html
to identify addi-
tional unusual vectors.
■
Test your exploit by submitting it to the application. If your crafted string
Do'stlaringiz bilan baham: |