-
Notifications
You must be signed in to change notification settings - Fork 103
Test 5) Cross Site Scripting
Yalçın YOLALAN edited this page Mar 28, 2018
·
2 revisions
Vulnerability Type Dynamic
Test Web Service URI http://[yourhostName]/XSS.asmx?WSDL
Vulnerable Code Block This method displays message on browser and does not validate the input string:
ShowMessageOnBrowser(txt);
return txt;
Attack Payload <script>alert(1)</script>
Vulnerable Method Name ShowMessage Vulnerable Parameter Name txt
Response
<script>alert(1)</script>Indications of Vulnerability
Web server returned: Http status code is 200 (i.e. OK - The request has succeeded).
Malicious script (payload) is returned without any escaping of the payload.
- Home
- Installation
- Usage
- Default Parameter Values
- Scope
- Donation
-
Testing Activities
- XML Bombs
- External Entity Attacks
- Insecure Communication
- Insufficient Authentication Test
- Cross Site Scripting
- SQL Injection
- XPATH Injection
- Verbose SOAP Fault Message
- Weak WS-SecurityPolicy: Insecure Transport
- Weak WS-SecurityPolicy: Insufficient Supporting Token Protection
- Weak WS-SecurityPolicy: Tokens Not Protected
- Weak XML Schema: Undefined Namespace
- Weak XML Schema: Unbounded Occurrences