<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Cross_Site_History_Manipulation_%28XSHM%29</id>
		<title>Cross Site History Manipulation (XSHM) - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Cross_Site_History_Manipulation_%28XSHM%29"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cross_Site_History_Manipulation_(XSHM)&amp;action=history"/>
		<updated>2026-04-21T02:06:35Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cross_Site_History_Manipulation_(XSHM)&amp;diff=234264&amp;oldid=prev</id>
		<title>James Bowie: /* References */ Updated the link to the Checkmarx document.  The old link resulted in a 404.</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cross_Site_History_Manipulation_(XSHM)&amp;diff=234264&amp;oldid=prev"/>
				<updated>2017-10-10T16:11:37Z</updated>
		
		<summary type="html">&lt;p&gt;‎&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;References: &lt;/span&gt; Updated the link to the Checkmarx document.  The old link resulted in a 404.&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 16:11, 10 October 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{template: Attack}}&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{template: Attack}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:OWASP ASDR Project]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:OWASP ASDR Project]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l68&quot; &gt;Line 68:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 69:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [[OWASP_Israel_2010_02#19:10_-_19:40.C2.A0:_XSHM_-_Cross_Site_History_Manipulation|Presentation in OWASP Israel Local Chapter Meeting (Feb-2010)]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [[OWASP_Israel_2010_02#19:10_-_19:40.C2.A0:_XSHM_-_Cross_Site_History_Manipulation|Presentation in OWASP Israel Local Chapter Meeting (Feb-2010)]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;http&lt;/del&gt;://www.checkmarx.com/&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Upload&lt;/del&gt;/&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Documents&lt;/del&gt;/&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;PDF&lt;/del&gt;/XSHM&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;%20Cross%20site%20history%20manipulation&lt;/del&gt;.pdf Cross site history manipulation (XSHM) Guide]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;https&lt;/ins&gt;://www.checkmarx.com/&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;wp-content&lt;/ins&gt;/&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;uploads&lt;/ins&gt;/&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;2012/07&lt;/ins&gt;/XSHM&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;-Cross-site-history-manipulation&lt;/ins&gt;.pdf Cross site history manipulation (XSHM) Guide]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [http://www.infosecurity-magazine.com/view/6828/checkmarx-identifies-new-web-browser-vulnerability/ Checkmarx identifies new web browser vulnerability], ''InfoSecurity Magazine'', January 27, 2010&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [http://www.infosecurity-magazine.com/view/6828/checkmarx-identifies-new-web-browser-vulnerability/ Checkmarx identifies new web browser vulnerability], ''InfoSecurity Magazine'', January 27, 2010&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [http://www.checkmarx.com/Demo/XSHM.aspx Demo for Internet Explorer users - &amp;quot;Am I using Facebook?&amp;quot;]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [http://www.checkmarx.com/Demo/XSHM.aspx Demo for Internet Explorer users - &amp;quot;Am I using Facebook?&amp;quot;]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>James Bowie</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cross_Site_History_Manipulation_(XSHM)&amp;diff=78198&amp;oldid=prev</id>
		<title>Adar Weidman: /* References */ Added link to presentation in OWASP Israel chapter meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cross_Site_History_Manipulation_(XSHM)&amp;diff=78198&amp;oldid=prev"/>
				<updated>2010-02-10T00:46:25Z</updated>
		
		<summary type="html">&lt;p&gt;‎&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;References: &lt;/span&gt; Added link to presentation in OWASP Israel chapter meeting&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 00:46, 10 February 2010&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l67&quot; &gt;Line 67:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 67:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [[OWASP_Israel_2010_02#19:10_-_19:40.C2.A0:_XSHM_-_Cross_Site_History_Manipulation|Presentation in OWASP Israel Local Chapter Meeting (Feb-2010)]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [http://www.checkmarx.com/Upload/Documents/PDF/XSHM%20Cross%20site%20history%20manipulation.pdf Cross site history manipulation (XSHM) Guide]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [http://www.checkmarx.com/Upload/Documents/PDF/XSHM%20Cross%20site%20history%20manipulation.pdf Cross site history manipulation (XSHM) Guide]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [http://www.infosecurity-magazine.com/view/6828/checkmarx-identifies-new-web-browser-vulnerability/ Checkmarx identifies new web browser vulnerability], ''InfoSecurity Magazine'', January 27, 2010&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [http://www.infosecurity-magazine.com/view/6828/checkmarx-identifies-new-web-browser-vulnerability/ Checkmarx identifies new web browser vulnerability], ''InfoSecurity Magazine'', January 27, 2010&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Adar Weidman</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cross_Site_History_Manipulation_(XSHM)&amp;diff=78129&amp;oldid=prev</id>
		<title>Adar Weidman: Add XSHM</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cross_Site_History_Manipulation_(XSHM)&amp;diff=78129&amp;oldid=prev"/>
				<updated>2010-02-08T16:12:03Z</updated>
		
		<summary type="html">&lt;p&gt;Add XSHM&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{template: Attack}}&amp;lt;br&amp;gt;&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
'''Cross-Site History Manipulation (XSHM)''' is a [http://en.wikipedia.org/wiki/Same_origin_policy SOP (Same Origin Policy)] security breach. SOP is the most important security concept of modern browsers. SOP means that web pages from different origins by design cannot communicate with each other. '''Cross-Site History Manipulation''' breach is based on the fact that client-side browser history object is not properly partitioned on a per-site basis. Manipulating browser history may lead to SOP compromising, allow bi-directional [[Cross-Site_Request_Forgery_(CSRF)|CSRF]] and other exploitations such as: user privacy violation, login status detection, resources mapping, sensitive information inferring, users’ activity tracking and URL parameter stealing.&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
By manipulating the browser history it is possible to compromise SOP and violate user privacy.  Using [[Cross-Site_Request_Forgery_(CSRF)|CSRF]] in conjunction with history manipulation, not only integrity but also confidentiality can be targeted. Feedbacks from a different origin can be accessed and Cross-Site information leakage is achieved.&lt;br /&gt;
&lt;br /&gt;
The following attack vectors based on techniques of '''XSHM''' are possible:&lt;br /&gt;
* Cross-Site Condition Leakage&lt;br /&gt;
** Login Detection&lt;br /&gt;
** Resource Mapping&lt;br /&gt;
** Error Leakage&lt;br /&gt;
** State Detection&lt;br /&gt;
** Information Inference&lt;br /&gt;
* Cross-Site User Tracking &lt;br /&gt;
* Cross-Site URL/Parameters Enumeration&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
=== What is Condition Leakage? ===&lt;br /&gt;
Condition leakage occurs when an attacker can infer a sensitive value of a conditional statement in an attacked application. For example, if a site contains the following logic:&lt;br /&gt;
 Page A: If (CONDITION)&lt;br /&gt;
            Redirect(Page B)&lt;br /&gt;
&lt;br /&gt;
an attacker can execute the [[Cross-Site_Request_Forgery_(CSRF)|CSRF]] and get an indication about the value of the condition as a feedback. This attack is executed from an attacker site. The site then submits a Cross-Site request to a victim site, and by manipulating the History object gets a feedback with required information leaked from a victim site. It is important to mention that the redirect command can appear explicitly in the code, or can be completed by the operational environment.&lt;br /&gt;
&lt;br /&gt;
Attack Vector:&lt;br /&gt;
# Create IFRAME with src=Page B&lt;br /&gt;
# Remember the current value of history.length &lt;br /&gt;
# Change src of IFRAME to Page A&lt;br /&gt;
# If the value of history.length is the same, then the CONDITION is TRUE&lt;br /&gt;
&lt;br /&gt;
=== Login Detection ===&lt;br /&gt;
The following demo for IE and Facebook can show how one can identify if users are currently using facebook: [http://www.checkmarx.com/Demo/XSHM.aspx &amp;quot;Am I using Facebook?&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
===Cross-Site Information Inference===&lt;br /&gt;
It is possible to inference sensitive information from a page on a different origin, if it implements a conditional redirect. Suppose that in an HR application which is not publically accessible, a legal user can search employees by name, salary and other criteria. If the search has no results, a redirect command is then executed to a &amp;quot;Not Found&amp;quot; page. By submitting the following URL:&lt;br /&gt;
 http://Intranet/SearchEmployee.aspx?name=Jon&amp;amp;SalaryFrom=3000&amp;amp;SalaryTo=3500&lt;br /&gt;
and observing the NotFound redirection, attackers can inference sensitive information about a worker's salary.&lt;br /&gt;
&lt;br /&gt;
This can be done by using the following attack vector:&lt;br /&gt;
# Create IFRAME with src=&amp;quot;NotFound.aspx&amp;quot;&lt;br /&gt;
# Remember the current value of history.length&lt;br /&gt;
# Change src of IFRAME to &amp;quot;SearchEmployee.aspx?name=Jon&amp;amp;SalaryFrom=3000&amp;amp;SalaryTo=3500&amp;quot;&lt;br /&gt;
# If the value of history.length remains the same, then your search has no results&lt;br /&gt;
&lt;br /&gt;
By repeating the above attack and trying different values of the salary parameters, an attacker can gather very sensitive salary information of any employee. This is a very serious Cross-Site information leakage. If an application has a functionality like a search page with conditional redirect, then this application is vulnerable to '''XSHM''' and essentially it is a similar to a direct exposure to [[media:OWASP_IL_The_Universal_XSS_PDF_Vulnerability.pdf|Universal XSS]] – the application itself is [[Cross-site Scripting (XSS)|XSS]]-safe, but running it from a different site inside an IFRAME makes it vulnerable.&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* [[Cross-Site_Request_Forgery_(CSRF)|Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
* [[Cross Site Scripting Flaw]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
* [[Input Validation]]&lt;br /&gt;
* [[Output Validation]]&lt;br /&gt;
* [[Canonicalization]]&lt;br /&gt;
&lt;br /&gt;
==References ==&lt;br /&gt;
* [http://www.checkmarx.com/Upload/Documents/PDF/XSHM%20Cross%20site%20history%20manipulation.pdf Cross site history manipulation (XSHM) Guide]&lt;br /&gt;
* [http://www.infosecurity-magazine.com/view/6828/checkmarx-identifies-new-web-browser-vulnerability/ Checkmarx identifies new web browser vulnerability], ''InfoSecurity Magazine'', January 27, 2010&lt;br /&gt;
* [http://www.checkmarx.com/Demo/XSHM.aspx Demo for Internet Explorer users - &amp;quot;Am I using Facebook?&amp;quot;]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Same_origin_policy Wikipedia: Same Origin Policy (SOP)]&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
{{Template:Checkmarx}}&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Adar Weidman</name></author>	</entry>

	</feed>