Recently tested XSS attack fix, found a relatively good article, share to everyone.Update20151202:Thank you for your attention and answer, at present I learned from various ways of defense methods, organized as follows:PHP directly output HTML, you can use the following methods to filter:
1
1.htmlspecialchars函数
2
3
2.htm
1. What is cross site scripting?
Cross Site Scripting (or XSS) is one of the most common application-layer Web attacks. XSS commonly targets scripts embedded in a page which are executed on the client-side (in the user's web browser) rather than on the server-side. XSS in itself is a threat which is brought about by the Internet security weaknesses of client-si
The following function can be used to filter user input to ensure that the input is XSS safe. Specific how to filter, you can see inside the function, there are comments.
Copy Code code as follows:
function Removexss ($val) {
Remove all non-printable characters. CR (0a) and LF (0b) and TAB (9) are allowed
This prevents some character re-spacing such
First, test the input filtering. Generally, test the mail content at the beginning: Use
In the topic and content sections, enter the content in the topic. When you enter the content, the content is filtered. The input filter does not mean that the content can be XSS (for many reasons ),
Next we will study the XSS filtering of topics. After a general test, it
+ % 3E % 3C % 2 fscript % 3E category =-1 action = Search action_search = this time is still too long, we moved down through url.cn to make him more concise: http://url.cn/E273r7 was then posted to fenng's Weibo comments via Weibo. (With the nature of a social worker) It was not long before several users were recruited.Obtained information:Hazards: Reflection XSS is used well, which can cause great harm ~ There is also a
XSS Rootkit: http://www.bkjia.com/Article/201110/107620.html
However, I still don't feel comfortable. I don't need to lose some practical things, so it's easy for others to understand. So I have to take a website for practical testing.
I took a DISCUZ non-persistent XSS test, and IE8 would intercept it. Therefore, we need to disable the XSS
group names are not allowed to appear Well, this problem is still the nickname of the group, but it is brilliant on windows ~Let's first create a group, and then the attacker will do one more thing to go to the settings of Alibaba trademanager to change the blister mode,
Then you can reply to anything ~~~ As long as you reply.Why do you need to change the code? After the change, you can @ people and the encoding process is different.
After changing the bubble, you can see that the white one i
CKEditor and TinyMCE. These can be output in HTML and can be visually edited by users. Although they can perform verification on the client side, this is not safe enough. You need to verify and clear Harmful HTML code on the server side to ensure that the HTML entered to your website is safe. Otherwise, attackers can bypass Javascript verification on the client and inject insecure HMTL to your website.
Jsoup's whitelist cleaner can filter user input
would be executed automatically when other users browsed the site for the purpose of the attack. For example, theft of user cookies, destruction of page structure, redirection to other websites, etc. XSS attacks are similar to SQL injection attacks. It seems that the harm is very big, we must mend it. So how to fix it, first of all we know how he attacked:We directly enter , and when the user views this page, Will request www.jwdstef.com This site, t
Build a vulnerable web site locally to verify XSS vulnerabilities and how SQL injection is exploited.Use the Phpstudy tool to build a gourmet CMS website platform.0x01 XSS TestTo open debug mode, locate the name bar input box:Try inserting the XSS attack code in value:123 ">Click Update to successfully pop up the cookie information on the website after login. Not
As discussed earlier, in resolving post cross-domain requests, it is best to use iframe+ as a proxy page for this domain, with compatibility (including IE6, of course). Last mentioned, the role of the proxy page is to execute the callback function under this domain. This is the reason for the convenience of XSS. For more information, refer to a cross-domain request for XSS VulnerabilityAs mentioned last tim
Recently, the project was launched. A third-party company was invited to perform a penetration test and multiple XSS attacks were detected. Because we have used URLFilter to filter special characters for URL Get requests, the Get request vulnerability has been blocked. However, for Post requests, considering the existence of form submission in our project, rich text editing and other functions, dare not ras
Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
X Web Security-XSS more X
Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Author: CyberPhreak
Translation: Ghost [S.S. T]
~ Introduction
In this article, I will explain all the knowledge about XSS and more. through this document, I hope you can understand what XSS is, Why XSS is used, and how to use
XSS Principle Analysis and anatomy: Chapter 4 (coding and bypassing)
0 × 01 Preface
Sorry, I have been pushing the fourth chapter for a few months. Today is New Year's Day, so I will write down Chapter 4. I will first describe the encoding mainly used, and I will talk about it later.
We recommend that you read this article together with the miscellaneous about how to bypass WAF.
0 × 02 URL Encoding
URLs only allow printable characters in the US-ASCII
malicious script injections. As explained by MSDN, HTMLEncode can only be used to'','>',''And'"'And also includes ASCII codes larger than 0x80, although this depends on the environment of the server, with different versions of IIS escaping. For example, there is a difference between publishing a site to IIS6 and publishing to IIS7, and if you're just debugging a Web application on VS, HTMLEncode's escape is different. As to what are cross-site scripting attacks and why are they preventing cros
Reflective XSS is also known as non-persistent CSS. When a user accesses a URL request with an XSS code, the server receives the data after processing, and then sends the data with the XSS code to the browser, and the browser resolves this piece of data with XSS code, resulting in an
XSS is not always caused by a vulnerability.Xss--cross site script, as long as the page is outside the station scripts, can be counted. Usually only caused by the vulnerability, but in some special occasions, any page can appear outside of the script, such as the previous discussion of traffic hijacking, or browser plug-ins, are very common situation.Therefore, in addition to the online alert, we can also count the various regional operators of the a
This time to bring you Laravel 5 How to stop XSS cross-site attacks, Laravel 5 How to prevent XSS cross-site attack attention to what, the following is the actual case, take a look.
This paper describes the methods of preventing XSS from cross-site attack in Laravel5. Small series to share for everyone to refer to, the specific following:
The Laravel 5 itself d
What is XSS blind? Blind playing is just a common saying, that is, if the background does not know whether XSS exists or not, the input of XSS code is left blank, feedback, or something like that, try as many XSS statements and statements as possible. "XSS blind" refers to
Page Test with input boxFor non-Rich Text, enter special characters in the input box On the submitted page, check the source code. Based on the keyword tiehua, check whether the Rich text input boxIf the page is submitted due to typographical issues or js errors, it indicates that the input box has the xss Vulnerability (a bug is reported ).Test Page Link ParametersLinks with parameters such:Http://mall.taobao.com /? Ad_id = am_id = cm_id = pm_id =
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.