The injected code would be displayed on the front-end of the site as follows:

Depending on the server configuration and software versions being used, this may or may not result in a security issue. If you are using a software package that was installed via a package manager, then the issue likely won’t be an issue. Even if the package is installed via a direct download, the issue may be mitigated by the server software being able to parse the type of file being uploaded. If, however, the file is being uploaded via FTP, the issue may be exploited due to the file’s nature. The file type being uploaded is likely to be considered unsafe. Since the file is likely to be considered unsafe, the server is unlikely to be able to parse the file. This results in an issue where the uploaded file is not be able to be processed by the software being used.

Server Side Template Injection

Server side template injection is a method of injecting malicious code into web pages rendered by a Web server. This type of injection is typically achieved through the use of a "

Web Application Attack Vectors

Cross-site scripting (XSS) is a type of computer security vulnerability. It involves injection attacks, typically using some form of HTML, to execute malicious scripts within the context of another website.

The following web application attack vectors are currently known:

1) Reflected XSS: When an attacker tricks a user into clicking on a specially crafted URL that causes JavaScript code to be executed in the user's browser in the context of the site. This is a very common vector used by attackers because it can be difficult to detect and its effects can be devastating.
2) Stored XSS: When an attacker manages to inject malicious script into the user's browser via an unvalidated request or response, then this script will remain stored in their local storage and will be executed whenever they visit that same page or another page on the same site containing malicious script.
3) DOM-based XSS: When an attacker tricks a user into clicking on a specially crafted HTML element, such as an image or link, which causes JavaScript code to be executed in the context of the site. This type of attack works by forcing users who click on those elements (elements with "javascript:" URIs) to input their credentials into forms controlled by the attacker and therefore may lead to leaking sensitive information from their session.

Timeline

Published on: 10/07/2022 11:15:00 UTC
Last modified on: 10/07/2022 20:43:00 UTC

References