When you have identified every instance in which user-controllable data is
stored by the application and later displayed back to the browser, you should fol-
low the same process described previously for investigating potential reflected
XSS vulnerabilities — that is, determine what input needs to be submitted to
70779c12.qxd:WileyRed 9/14/07 3:14 PM Page 416
cumvent any filters which interfere with the processing of your attack
payload. T I P