Featured
- Get link
- X
- Other Apps
Vulnerabilities in web pages
What it is?
This is a vulnerability that can allow an invader to inject JavaScript code into a
website page. Since JavaScript is a language that runs in the client's browser,
when we execute this code, we do it in the user's client. The website only acts
as a code execution tool for the users who view it.
There are some
different types of XSS vulnerabilities, the most famous of which are the
following:
XSS Persistent or
Stored - Stored in the database. Therefore, the code we insert will be stored
in the database or on the page, so that every time a person sees this page, the
code will be executed.
Mirror XSS - The
code will only run when the target user executes a specific URL generated or
written by an attacker. An attacker would manipulate the URL he sends to his
target, and when the target executes or opens that URL, the code will be
executed.
Conclusion
In the article, we
saw the XSS or Cross-site Scripting vulnerability, which is one of the most
common. As we have explained, this vulnerability does not affect the Internet
or the server on which it is hosted, but rather serves as a link to access the
users who visit it, who are the real victims.
If we succeed in
hijacking the browser using this technique, the attacker could use social
engineering strategies. Thus, it will lead us to believe that it is necessary
to install a browser extension or plugin, or update one that has expired. The
goal is to install spyware or software that allows you to control our hardware.
Finally, we leave
out some minimum security rules that must be followed to avoid falling prey to
this type of vulnerability.
XSS vulnerability
fix
These
vulnerabilities occur because every time the user enters something into a text
box or parameter, that input is rendered in HTML. Since it treats it as part of
the page, if it contains JavaScript the code will be executed.
The best we can do
to avoid this vulnerability is to try to minimize the use of untrusted records.
We need to kind sure that the code they are trying to inject is converted to an
equivalent HTML string and not executed.
As a user, to avoid
dropping victim to an XSS-type attack, you must be careful not to fall for such
a deception. If a page notifies us that we need an update, we must check if it
is correct on the official product page.
We must always be
wary of pop-up notifications urging us to act. The wisest thing to do is not
trust them.
- Get link
- X
- Other Apps