Hi everyone how are you all?

I hope you are all doing hunt and working for break a code .

Today I am explaining about A7:2017 vulnerability Cross Site Scripting aka XSS. If you are not aware about OWASP then visit owasp.org you will get bunch of information about OWASP or visit his wiki. So Ladies and Gentlemen today I am discussing about XSS. There has lots of XSS virtual lab available in our search engine and offline lab also available and bunch of javascript libraries are availble for basic understanding of xss and also xss labs are available in tryhackme.com, hackthebox academy, websecurity academy by portswigger, pentesterlabpro blah blah……………………………

Description:

Cross-Site Scripting (otherwise known as XSS) is a vulnerability that allows a malicious actor to manipulate a legitimate user’s interactions with a vulnerable web application. Attackers exploit this to bypass the same origin policy, often allowing them to perform any actions that the target user would normally perform, including gaining access to their data. In cases where the victim user has privileged application access, the attacker may use XSS to gain control of the application.

XSS attacks typically occur in web applications when data is received, frequently in the form of a web request, and the data is reflected back in the HTTP response to the user without validation.

XSS attacks can generally be divided into the following three categories.

Reflected XSS:

Reflected XSS attacks arise when a web server reflects injected script, such as a search result, an error message, or any other response that includes some or all of the input sent to the server as part of the request.

The attack is then delivered to the victim through another route (e.g. e-mail or alternative website), thus tricking the user into clicking on a malicious link. The injected code travels to the vulnerable website, which reflects the attack payload back to the user’s browser. The browser then executes the code because it came from a “trusted” server.

Stored XSS:

In the Stored XSS attack, the injected script is stored on the target application as legitimate content, such as a message in a forum, a comment in a blog post, etc. The injected code is stored in the database and sent to the users when it is retrieved by accessing the injected content, executing the attack payload in the victim’s browser.

Dom-based XSS:

DOM-based XSS vulnerabilities usually occur when the JavaScript in a page takes user-provided data from a source in the HTML, such as the document.location, and passes it to a JavaScript function that allows JavaScript code to be run, such as innerHTML(). The classic attack delivers the payload to the victim through another route (e.g. e-mail or alternative website) and thus tricks the user into visiting a malicious link. The exploitation is client-side, and the code is immediately executed in the user’s browser.

Impact:

XSS attacks can result in the disclosure of the user’s session cookie, allowing an attacker to hijack the user’s session and take over the account. Even though HTTPOnly is used to protect cookies, an attacker can still execute actions on behalf of the user in the context of the affected website.

As with all of the severe vulnerabilities that make up a part of the OWASP Top 10, XSS attacks can result in full compromise of a user’s system. As stated in the description, if an attacker compromises a user holding the ‘keys to the kingdom’ i.e. privileged access to applications / administrator rights, the results can be devastating.

Prevention:

XSS attacks can be mitigated by performing appropriate server-side validation and escaping.

Remediation relies on performing Output Encoding (e.g. using an escape syntax) for the type of HTML context where untrusted data is reflected into.

Input Validation:

  • Exact Match: Only accept values from a finite list of known values.
  • Allow list: If a list of all the possible values can’t be created, accept only known good data and reject all unexpected input.
  • Deny list: If an allow-list approach is not feasible (on free form text areas, for example) reject all known bad values.

Output Encoding:

Output Encoding is used to convert untrusted input into a safe form where the input is displayed as data to the user without executing as code in the browser. Output Encoding is performed when the data leaves the application to a downstream component. The table below lists the possible downstream contexts where the untrusted input could be used:

The following chart details a list of critical output encoding methods required to mitigate Cross Site Scripting:

Defense in Depth

— — — — — — — — — — — —

Content Security Policy (CSP):

The Content Security Policy (CSP) is a browser mechanism that enables the creation of source allow lists for client-side resources of web applications e.g. JavaScript, CSS, images etc. CSP via a special HTTP header instructs the browser to only execute or render resources from those sources.

For example:

Content-Security-Policy: default-src: ‘self’; script-src: ‘self’ static.domain.tld

The above CSP will instruct the web browser to load all resources only from the page’s origin, and JavaScript source code files additionally from static.domain.tld.

follow this link: https://content-security-policy.com/

X-XSS-Protection Header:

This HTTP response header enables the Cross-Site Scripting (XSS) filter built into some modern web browsers. The header is usually enabled by default anyway, so its role is to re-enable the filter for a particular website if it was disabled by the user.

Use a Modern Framework with an Auto-Escaping Template System:

Modern JavaScript frameworks (e.g. AngularJS, ReactJS) or server-side templating systems (e.g. Go Templates) have robust built-in protections against Reflected Cross-Site Scripting.

Testing:

Verify that context-aware, preferably automated — or at worst, manual

PAYLOADS:

https://github.com/topics/bugbountytips

I hope you will find useful.

Thank you,

please share and give a clap

Penetration Tester@⠎⠓⠁⠗⠍⠊⠞⠁⠝⠍⠁⠽

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Why did Google & Facebook stop using the traditional network connection?

📜 We’re glad to announce ASH has joined us! 📜

Inside jobs — protecting your organisation from the cyber threat within

Shibaswap — Klee V2 Migration

PERI Finance will Open Staking dApp on BSC Mainnet

8 steps to reclaim your online privacy and prepare for 2017

Reconnaissance the key to Ethical Hacking !

DFK Full Contract List

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Tanmay Bhattacharjee

Tanmay Bhattacharjee

Penetration Tester@⠎⠓⠁⠗⠍⠊⠞⠁⠝⠍⠁⠽

More from Medium

OWASP Top 10:2021 (JAVA)

Jmeter capture x-csrf-token

Private Automation Hub

Step by step use of Azure Key Vault (Secrets) in a React application