Web application security - the fast guide 1.1 | Page 133

Chapter 6 - Attack execution (2) attacker P a g e | 133 Submit a content to be stored on backend DB The victim accesses the page with the shared content poisoned with attacker script Page with shared contents Client Client execute the script embedded in the shared content Attack Process: A. The attacker accesses the vulnerable site and submit a content poisoned with java script containing the attack payload B. The attack payload might be anything from session hijacking code by trying to retrieve (document.cookie) object, to forwarding to phished site owned by attacker. C. The victim accesses the shared contents loads the poisoned contents. D. The attack payload script is executed on the victim machine. Example: A vulnerable site that allow the visitors to post answers for a specific question without proper input validation. The attacker uses the fact that no sanitization is done on the submitted questions and send the following: Any Text as an answer to the question