The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Chapter 12  ■ Attacking Other Users



Download 5,76 Mb.
Pdf ko'rish
bet659/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   655   656   657   658   659   660   661   662   ...   875
Bog'liq
3794 1008 4334

Chapter 12 



Attacking Other Users



383

70779c12.qxd:WileyRed  9/14/07  3:14 PM  Page 383




post responses. If a user can post a question containing embedded JavaScript,

and the application does not filter or sanitize this, then an attacker can post a

crafted question that causes arbitrary scripts to execute within the browser of

anyone who views the question, including both the seller and other potential

buyers. In this context, the attacker could potentially cause unwitting users to

bid on an item without intending to, or cause a seller to close an auction and

accept the attacker’s low bid for an item.

Attacks against stored XSS vulnerabilities typically involve at least two

requests to the application. In the first, the attacker posts some crafted data

containing malicious code that gets stored by the application. In the second, a

victim views some page containing the attacker’s data, at which point the

malicious code is executed. For this reason, the vulnerability is also sometimes

referred to as second-order cross-site scripting. (In this instance, “XSS” is really

a misnomer, as there is no cross-site element to the attack. The name is widely

used, however, so we will retain it here.)

Figure 12-4 illustrates how an attacker can exploit a stored XSS vulnerability

to perform the same session hijacking attack as was described for reflected XSS.

Figure 12-4: The steps involved in a stored XSS attack

There are two important differences in the attack process between reflected

and stored XSS, which make the latter generally more serious from a security

perspective.

Application 

2. User logs in 

3. User views attacker’

s question 

4. Ser

ver responds with  



attacker’

s JavaScript 

5. Attacker’s  

JavaScript  

executes in  

user’s browser 

6. User’s browser sends session token to attacker 

7. Attacker hijacks user’

s sess

ion 


1. A

ttacker submits question  

containing malicious JavaScript 

User 


Attacker 


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   655   656   657   658   659   660   661   662   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish