A3:2021 | Cross Site Scripting (XSS) (2) | Cycubix Docs
What is XSS?
Cross-Site Scripting (also known as XSS) is a vulnerability/flaw that combines the allowance of HTML/script tags as input that renders into a browser without encoding or sanitization.
Cross-Site Scripting (XSS) is the most prevalent and pernicious web application security issue.
While there is a simple well-known defense for this attack, there are still many instances on the web. Coverage of fixes also tends to be a problem in terms of fixing it. We will talk more about the defense in a little bit.
XSS has significant impact
Especially as 'Rich Internet Applications' are more and more commonplace, privileged function calls linked to via JavaScript may be compromised. And if not adequately protected, sensitive data (such as your authentication cookies) can be stolen and used for someone else’s purpose.
Quick examples:
From the JavaScript console in the developer tools of the browser (Chrome, Firefox)
Any data field returned to the client is potentially injectable
Try It! Using Chrome or Firefox
Open a second tab and use the same URL as this page you are currently on (or any URL within this instance of WebGoat).
On the second tab, open the JavaScript console in the developer tools and type:
alert(document.cookie);
.
Solution
Yes, the cookies were the same on each tab.
The reason all cookies are the same in two tabs in WebGoat is due to how session cookies are shared across tabs within the same browser instance. This behavior is by design to maintain user session state.
Last updated