Web application security - the fast guide 1.1 | Page 109
Chapter 5 - Attack Execution the client
P a g e | 109
C. Release the altered request.
Example:
http://testwebsite.com/buy/?pid=12&discount=4
In the previous example changing the discount parameter directly from address
bar can change the discount on the product.
5.20 Only Client side validation
Send legitimate Request
with valid values
Web Form Client Only
Validation
Intercept
request with
Proxy like Burp
Manipulate Values
and add malicious
Contents (SQL inj.)
Retransmit with
malicious
contents
No
Server
Validatio
Send privileged
response to client
(and/or ) execute
a malicious code
Figure 43: client only validation attack
any JavaScript based validation without server side interference can be
manipulated and bypassed.
Attacker might try to alter the allowed max length to enable free entry in the
field. Attack will disable the validation in the form to enable any type of cross site
scripting, SQL injection or memory overflow.
Attack requirement
No server side form validation.
Attack process
A. Using a proxy capture the response containing the page with the form.
B. Alter the values to required values to execute any attack like SQL
injection.
C. Alter the JavaScript validation by disable or by simply returning valid
whatever value is entered.
D. Release the altered response and submit the form.