handbook/tools/3.Web-Hacking/4.Injection/XSS/Notes/2.Reflected-XSS.md
2024-08-31 01:07:22 +02:00

2.1 KiB

Reflected XSS

Reflected XSS happens when user-supplied data in an HTTP request is included in the webpage source without any validation.

  • Potential Impact:

    The attacker could send links or embed them into an iframe on another website containing a JavaScript payload to potential victims getting them to execute code on their browser, potentially revealing session or customer information.

  • How to test for Reflected XSS:

    You'll need to test every possible point of entry; these include:

    • Parameters in the URL Query String
    • URL File Path
    • Sometimes HTTP Headers (although unlikely exploitable in practice)
    • Title name of a website post --->
      • example !Pasted image 20221129102249.png

    Once you've found some data which is being reflected in the web application, you'll then need to confirm that you can successfully run your JavaScript payload; your payload will be dependent on where in the application your code is reflected

  • Example Scenario:

    A website where if you enter incorrect input, an error message is displayed. The content of the error message gets taken from the error parameter in the query string and is built directly into the page source.

    The application doesn't check the contents of the error parameter, which allows the attacker to insert malicious code.

    The vulnerability can be used as per the scenario in the image below: