-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
The Web Application Hacker's Handbook
By :
XSS vulnerabilities come in various forms and may be divided into three varieties: reflected, stored, and DOM-based. Although these have several features in common, they also have important differences in how they can be identified and exploited. We will examine each variety of XSS in turn.
A very common example of XSS occurs when an application employs a dynamic page to display error messages to users. Typically, the page takes a parameter containing the message's text and simply renders this text back to the user within its response. This type of mechanism is convenient for developers, because it allows them to invoke a customized error page from anywhere in the application without needing to hard-code individual messages within the error page itself.
For example, consider the following URL, which returns the error message shown in Figure 12.1:
http://mdsec.net/error/5/Error.ashx?message=Sorry%2c+an+error+occurred
Figure 12.1 A...
Change the font size
Change margin width
Change background colour