Solved

Security agains XSS Attacks

Posted on 2015-02-03
3
100 Views
Last Modified: 2015-10-29
This is a test of the file-upload security at E-E.  If the file-upload allows XSS attacks, this file should make that obvious.  Similarly, if the file-upload process is properly secured, this should be obvious, too.evil.php
0
Comment
Question by:Ray Paseur
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 64

Accepted Solution

by:
btan earned 500 total points
ID: 40588555
good thing is that this test file and EE also make it none "executable" as it always render it as textual (non binary) reading. So simply click just show the text content of it. However if the file is some executable (by default not allowed for upload) or the rendering engine has vulnerability due to not proper validation done (e.g. buffer overflow), likely that can change the story...just some (wild) thoughts  :)

another example is clickjacking using some sort of code
<html>
   <head>
     <title>Clickjack test page</title>
   </head>
   <body>
     <p>Website is vulnerable to clickjacking!</p>
     <iframe src="http://www.target.site" width="500" height="500"></iframe>
   </body>
</html>

Open in new window

1
 
LVL 110

Author Closing Comment

by:Ray Paseur
ID: 41144266
Thanks - time to close this and move on :-)
0
 
LVL 64

Expert Comment

by:btan
ID: 41147048
Thanks Ray!
0

Featured Post

Get HTML5 Certified

Want to be a web developer? You'll need to know HTML. Prepare for HTML5 certification by enrolling in July's Course of the Month! It's free for Premium Members, Team Accounts, and Qualified Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question