Unterschiede
Hier werden die Unterschiede zwischen zwei Versionen angezeigt.
| Beide Seiten der vorigen Revision Vorhergehende Überarbeitung Nächste Überarbeitung | Vorhergehende Überarbeitung | ||
| modul:m183:learningunits:lu10:lu10a [2025/12/27 20:53] – [Related Topics] dgaravaldi | modul:m183:learningunits:lu10:lu10a [2025/12/27 21:02] (aktuell) – dgaravaldi | ||
|---|---|---|---|
| Zeile 18: | Zeile 18: | ||
| To execute a **stored XSS attack**, the attacker must find a vulnerability in a web application where user input is stored without proper validation or escaping. A common example is when a comment field or form accepts HTML input and embeds it directly into pages viewed by other users. | To execute a **stored XSS attack**, the attacker must find a vulnerability in a web application where user input is stored without proper validation or escaping. A common example is when a comment field or form accepts HTML input and embeds it directly into pages viewed by other users. | ||
| - | |||
| - | {{stored_xss.png? | ||
| **Example**: | **Example**: | ||
| Zeile 25: | Zeile 23: | ||
| \\ | \\ | ||
| ==== Stored XSS Attack — Step by Step ==== | ==== Stored XSS Attack — Step by Step ==== | ||
| - | 1. The attacker discovers a page with an input field that allows HTML. | + | {{: |
| - | 2. They insert malicious JavaScript code into that field. | + | |
| - | 3. The application stores and later serves that code as part of normal content. | + | - The attacker discovers a page with an input field that allows HTML. |
| - | 4. When other users visit the page, their browser executes the attack script. | + | |
| + | | ||
| + | | ||
| \\ | \\ | ||
| Zeile 40: | Zeile 40: | ||
| \\ | \\ | ||
| ==== Related Topics ==== | ==== Related Topics ==== | ||
| - | [1]: https:// | + | [1]: https:// |
| - | [2]: https:// | + | |
| - | [3]: https:// | + | [2]: https:// |