Testing for Reflected Cross Site Scripting
OWASP
OWASP Web Security Testing Guide 4.2 > 7. Data Validation Testing > 7.1. Testing for Reflected Cross Site Scripting
ID | Link to Hackinglife | Link to OWASP | Description |
---|---|---|---|
7.1 | WSTG-INPV-01 | Testing for Reflected Cross Site Scripting | - Identify variables that are reflected in responses. - Assess the input they accept and the encoding that gets applied on return (if any). |
Reflected Cross-site Scripting (XSS) occur when an attacker injects browser executable code within a single HTTP response. The injected attack is not stored within the application itself; it is non-persistent and only impacts users who open a maliciously crafted link or third-party web page. When a web application is vulnerable to this type of attack, it will pass unvalidated input sent through requests back to the client.
XSS Filter Evasion Cheat Sheet
Causes
This vulnerable PHP code in a welcome page may lead to an XSS attack:
Attack techniques
Go to my XSS cheat sheet
Last update: 2024-04-02 Created: December 26, 2023 19:00:18