Go Premium for a chance to win a PS4. Enter to Win

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 102
  • Last Modified:

Security agains XSS Attacks

This is a test of the file-upload security at E-E.  If the file-upload allows XSS attacks, this file should make that obvious.  Similarly, if the file-upload process is properly secured, this should be obvious, too.evil.php
0
Ray Paseur
Asked:
Ray Paseur
  • 2
1 Solution
 
btanExec ConsultantCommented:
good thing is that this test file and EE also make it none "executable" as it always render it as textual (non binary) reading. So simply click just show the text content of it. However if the file is some executable (by default not allowed for upload) or the rendering engine has vulnerability due to not proper validation done (e.g. buffer overflow), likely that can change the story...just some (wild) thoughts  :)

another example is clickjacking using some sort of code
<html>
   <head>
     <title>Clickjack test page</title>
   </head>
   <body>
     <p>Website is vulnerable to clickjacking!</p>
     <iframe src="http://www.target.site" width="500" height="500"></iframe>
   </body>
</html>

Open in new window

1
 
Ray PaseurAuthor Commented:
Thanks - time to close this and move on :-)
0
 
btanExec ConsultantCommented:
Thanks Ray!
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now