Fluxo de Execução
1) Explore
[Survey the application for user-controllable inputs] Using a browser or an automated tool, an adversary follows all public links and actions on a web site. They record all the links, the forms, the resources accessed and all other potential entry-points for the web application.
Técnica
- Use a spidering tool to follow and record all links and analyze the web pages to find entry points. Make special note of any links that include parameters in the URL.
- Use a proxy tool to record all links visited during a manual traversal of the web application.
- Use a browser to manually explore the website and analyze how it is constructed. Many browsers' plugins are available to facilitate the analysis or automate the discovery.
2) Experiment
[Probe identified potential entry points for XSS targeting HTML attributes] The adversary uses the entry points gathered in the "Explore" phase as a target list and injects various malicious expressions as input, hoping to embed them as HTML attributes.
Técnica
- Inject single and double quotes into URL parameters or other inputs to see if they are filtered out. Also use URL encoding to bypass filters.
- Use single or double quotes to close attribute evaluation and enter a new attribute that contains an expression.
3) Experiment
[Craft malicious XSS URL] Once the adversary has determined which parameters are vulnerable to XSS, they will craft a malicious URL containing the XSS exploit. The adversary can have many goals, from stealing session IDs, cookies, credentials, and page content from the victim.
Técnica
- Execute a script using an expression embedded in an HTML attribute, which avoids needing to inject a script tag.
- Send information gathered from the malicious script to a remote endpoint.
4) Exploit
[Get victim to click URL] In order for the attack to be successful, the victim needs to access the malicious URL.
Técnica
- Send a phishing email to the victim containing the malicious URL. This can be hidden in a hyperlink as to not show the full URL, which might draw suspicion.
- Put the malicious URL on a public forum, where many victims might accidentally click the link.
Pré-requisitos
The target application must fail to adequately sanitize HTML attributes against the presence of dangerous commands.
Recursos Necessários
The adversary must trick the victim into following a crafted link to a vulnerable server or view a web post where the dangerous commands are executed.
Mitigações
Design: Use libraries and templates that minimize unfiltered input.
Implementation: Normalize, filter and use an allowlist for all input including that which is not expected to have any scripting content.
Implementation: The victim should configure the browser to minimize active content from untrusted sources.
Fraquezas Relacionadas
| CWE-ID |
Nome da Fraqueza |
|
Improper Neutralization of Script in Attributes in a Web Page The product does not neutralize or incorrectly neutralizes "javascript:" or other URIs from dangerous attributes within tags, such as onmouseover, onload, onerror, or style. |
Referências
REF-94
Attribute-Based Cross-Site Scripting
Jeremiah Grossman.
http://jeremiahgrossman.blogspot.com/2007/07/attribute-based-cross-site-scripting.html
Submissão
| Nome |
Organização |
Data |
Data de lançamento |
| CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modificações
| Nome |
Organização |
Data |
Comentário |
| CAPEC Content Team |
The MITRE Corporation |
2017-05-01 +00:00 |
Updated Description Summary, Related_Attack_Patterns, Related_Weaknesses |
| CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated Description Summary |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Mitigations |
| CAPEC Content Team |
The MITRE Corporation |
2022-02-22 +00:00 |
Updated Execution_Flow, Resources_Required |