XSS is a type of injection that occurs when user input is not filtered properly and is redirected to another site. There are many different types of XSS, including:

Reflected XSS – The user is redirected to a site that allows injection, but the injection is tested against the code on the original site.

– The user is redirected to a site that allows injection, but the injection is tested against the code on the original site. Stored XSS – The user is redirected to a site that doesn’t allow injection, but the injection is tested against the database on the original site.

– The user is redirected to a site that doesn’t allow injection, but the injection is tested against the database on the original site. Redirection – The user is redirected to another site that doesn’t allow injection, but injection is tested against the server’s code on the original site.

The severity of XSS attacks depends on a few variables, including the user’s location and browser type.

Reflected XSS

A reflected XSS attack occurs when the user is redirected to a site that doesn’t allow injection, but the injection is tested against the code on the original site. The reflected XSS attack can be prevented by using Content Security Policy (CSP). With CSP, you can specify which types of content are allowed on your website and which are not. If a user tries to inject content into your website that isn’t allowed, they will receive an HTTP 403 error.

Note: You can also prevent this type of XSS with static analysis tools like OWASP ZAP.

HTML Injection

HTML injection occurs when user input is sent to the website as HTML code. This results in a cross-site scripting (XSS) attack.

It is important to note that, while XSS attacks are possible on all major browsers, they are more common on Internet Explorer and Safari than other browsers like Chrome and Firefox.

Timeline

Published on: 04/13/2022 18:15:00 UTC
Last modified on: 04/21/2022 20:21:00 UTC

References