当前位置:网站首页>XSS related knowledge points
XSS related knowledge points
2022-08-04 03:35:00 【Lord Chaser】
1. Introduction to XSS
The full name of XSS is Cross Site Scripting. In order to avoid confusion with the abbreviation of Cascading Style Sheets (CSS), it is abbreviated as XSS.It means that a malicious attacker inserts malicious Script code into a Web page, and when a user browses the page, the html code embedded in the Web will be executed, so as to achieve the purpose of maliciously attacking the user.XSS attacks are aimed at user-level attacks.
2. Reasons for XSS
The main reason for the formation of XSS vulnerabilities is that the program's control and filtering of input and output are not perfect and strict, resulting in "well-constructed" script input, which will be blocked by the browser when it is input to the front end.It is parsed and executed as valid code to cause harm.
3. Classification of XSS Vulnerabilities
1. Reflected XSS
Reflected XSS is a non-persistent, parametric cross-site scripting. This attack method is often one-time and only triggered when the user clicks.
Reflected XSS: through the back end, not through the database
Data flow: browser front end --> back end --> browser front end
2. DOM XSS
DoM is the document object model(Document Object Model) abbreviation.It is the object representation of the HTML document and is also the interface between external content (such as JavaScript) and HTML elements.
It is a vulnerability based on the DoM document object model, and DOM-type XSS is based on JS and does not require interaction with the server.It is an XSS cross-site scripting attack formed by modifying the data information of the DOM node of the page.Different from reflected XSS and stored XSS, DOM-based XSS cross-site scripting attacks often need to analyze specific Javascript DOM codes, and use XSS cross-site scripting attacks according to the actual situation.
Data flow: URL–> Browser front end
3. Stored XSS
Stored XSS is persistent cross-site scripting.Persistence is reflected in the fact that the XSS code is not in a parameter (variable), but is written into a medium such as a database or file that can permanently save data.Stored XSS usually occurs in places like message boards.
Data flow: browser –> backend –> database –> backend –> browser
Fourth, summary
Reflected XSS is non-persistent cross-site scripting.
DOM-type XSS is a vulnerability based on the DOM Document Object Model.
Stored XSS is persistent cross-site scripting.
On Harm: Stored XSS > DOM-XSS > Reflected XSS.
边栏推荐
猜你喜欢
自定义通用分页标签02
Postgresql源码(66)insert on conflict语法介绍与内核执行流程解析
SQL injection in #, - +, - % 20, % 23 is what mean?
[Study Notes Dish Dog Learning C] Dynamic Memory Management
千兆2光8电管理型工业以太网交换机WEB管理X-Ring一键环网交换机
仿牛客论坛项目梳理
STM8S105K4T6------Serial port sending and receiving
new Date converts strings into date formats Compatible with IE, how ie8 converts strings into date formats through new Date, how to replace strings in js, and explain the replace() method in detail
Architecture of the actual combat camp module three operations
复制带随机指针的链表
随机推荐
db2中kettle报错 Field [XXX] is required and couldn‘t be found 解决方法
如果禁用了安全启动,GNOME 就会发出警告
tkmapper的crud示例:
哎,又跟HR在小群吵了一架!
Introduction to the memory model of the JVM
仿牛客论坛项目梳理
Power button (LeetCode) 215. The first K largest elements in the array (2022.08.03)
SQL注入中 #、 --+、 --%20、 %23是什么意思?
PHP高级开发案例(1):使用MYSQL语句跨表查询无法导出全部记录的解决方案
数据湖(二十):Flink兼容Iceberg目前不足和Iceberg与Hudi对比
案例 | 重庆银行流动数据安全挑战及应对实践
This Thursday evening at 19:00, the fourth live broadcast of knowledge empowerment丨The realization of equipment control of OpenHarmony smart home project
逻辑漏洞----其他类型
复制带随机指针的链表
一文看懂推荐系统:召回05:矩阵补充、最近邻查找,工业界基本不用了,但是有助于理解双塔模型
JVM的内存模型简介
Y86. Chapter iv Prometheus giant monitoring system and the actual combat, Prometheus storage (17)
sql注入一般流程(附例题)
移动端响应式适配的方法
Mockito unit testing