CWE-79
Weakness ID:79(Weakness Base)
Status: Draft
NXTCgXNveBO
v
̐Ǝ㐫݂̑\tgEFÁA[U̓͂ɑ閳QKɍsȂ܂܁Ã[Uɒ Web y[W̏o͂Ɋ܂߂܂B
ڍׂȉ
NXTCgXNveBO (XSS) ̐Ǝ㐫́Aȉ̗lɔ܂B
1. MłȂf[^iʓI Web NGXgjWeb AvP[Vɓ͂A
2. Web AvP[VA̐MłȂf[^܂ Web y[WIɐ܂B
3. ̍ Web AvP[V́AMłȂf[^Ɋ܂܂ Web uEUŎs\ȃRec (JavaScriptAHTML ^OAHTML Agr[gA}EXCxgAFlashA ActiveX ) r܂B
4. ʃ[UAWeb uEUĐꂽy[WɃANZX܂B Web y[Wɂ́AMłȂf[^𗘗pđ}ꂽӂXNvg܂܂Ă܂B
5. XNvg Web T[ȏ Web y[WɗRĔĂ邽߁AQ҂ Web uEÚA Web T[õhC̃ReLXg̒ňӂXNvgs܂B
6. ͎AWeb uEU̓ꐶ|V̈Ӑ}ɈᔽĂ܂Bꐶ|V́AhC̒̃XNvgAقȂhCɂ郊\[Xւ̃ANZXR[h̎s\łĂ͂ȂȂƂ̂łB
XSS ɂ͎ɎO̎ނɕނ܂B
^Cv1Fˌ^NXTCgXNveBO (I)
T[óAHTTP NGXgf[^ړǂݍ݁Aǂݍf[^ HTTP X|Xɔf܂Bˌ^ XSS ÚAƎ Web AvP[VɑāAU҂Q҂Ɋ댯ȃRec𑗐Mۂɔ܂B̊댯ȃRećAQ҂ɕԂ Web uEUŎs܂BʓIȎiƂāAӂRec URL ̃p[^Ɋ܂߂Č̏ɌfA܂́AQ҂ɓdq[ڑ邱Ƃ܂B̃tBbVO\ɂĂÂ悤 URL U̗vƂȂĂ܂BU҂͔Q҂M܂ URL ɃANZX܂AQƐ͐ƎȃTCgłBTCgU҂̃RecQ҂ɕԂƁAQ҂̃uEUł̃Recs܂B
^Cv 2: i[^NXTCgXNveBO (I)
AvP[V́A댯ȃf[^Af[^x[XAbZ[WtH[AK҂̃OA܂͑̐Młf[^XgAɕۑ܂B̃f[^́ǍÃAvP[Vɓǂݖ߂AIRecɊ܂܂܂B
U҂̊ϓ_ł́AӂRec}̂ɍœKȏꏊ́Ã[U܂͕WIɂĂ郆[Uɕ\̈łBU҂͊TāAYAvP[VœʂȌLĂ邩AU҂ɂƂĉl̂@舵Ă郆[UWIƂ܂B[UӂRecsƁAU҂͂̃[UɂȂ肷܂AKvȑsA܂̓[Uۗ̕L@f[^ɑăANZXi\܂BႦAǗ҂ɂ郍OQƂ̍ۂɓKɈȂObZ[W XSS }\܂B
^Cv 0: DOMx[X̃NXTCgXNveBO
̎ނ XSS ł́AT[o Web y[Wɑ XSS }܂ADOM x[X XSS ł́ANCAg XSS Web y[Wɑ}܂BʂɁADOM x[X XSS ́AT[o䂷AMꂽXNvgłăNCAgɑM ([UeOɃtH[ŃTjeB`FbNs JavaScript ) ֗^܂BT[o̒XNvgA[U̒f[^ɁÃXNvg (I HTML ̎iɂ) Web y[WɖߍŕԂƁADOM x[X XSS \ƂȂ܂B
xӂXNvg}ƁAU҂͗lXȈӂs邱Ƃł܂BU҂̓ZbV܂ cookie ̂悤ȌlAQ҂̃}VUҎg̃}VւƓ]邱Ƃ\łB܂AQ҂Ĉӂ郊NGXg web TCgɑ邱Ƃ\ł邽߁AɔQ҂TCg̊ǗҌĂꍇ͔Ɋ댯łBtBbVOU͐Mꂽ web TCg͕킵AQ҂ɃpX[h̓͂𑣂܂B̍UƁAU҂͂ web TCgɂĔQ҂̃AJEgp邱Ƃ\łBŏIIɁAXNvg web uEÛ̂̐Ǝ㐫AQ҃}V邱Ƃ\łB"
̏ꍇAQ҂UɋCt邩ۂɊւ炸U͎s܂BӐ[[UłĂAU҂ӂÜꕔGR[h@ (URL GR[fBO܂ Unicode) 𗘗p̂ŁAŨNGXgɋCÂɂȂ܂B
ʖ
XSS
CSS
"CSS" ͂Ė{Ǝ㐫̗̂ƂĎgpĂ܂A"JXP[fBOX^CV[g" Ƃ̍߁Â̗͂܂藘pĂ܂B
Ǝ㐫̔
A[LeN`ѐv
YvbgtH[
Ɉˑ
A[LeN`̃p_C
Web x[X
Zp
Web T[o
vbgtH[⑫
XSS ̐Ǝ㐫̏ɂ͊J҂ɑ鑽̌PKvȂ߁A{Ǝ㐫 Web AvP[Vɑ݂܂B
ʓIȉe
e͈ | e |
---|---|
@ | ZpICpNgFی상JjỶAAvP[Vf[^̓ǂݍ
wǂ̃NXTCgXNveBOɂÚA[Uۗ̕L cookie Ɋ܂܂̘Rk܂B ʓIɂ́Aӂ郆[UNCAgTCh̕sȃXNvg쐬A Web uEU͂ƂɁA炩̓ (SẴTCg cookie ^ꂽdq[AhXɑM铙) ܂B̃XNvg Web TCg{e[Uɂ胍[hAs܂BXNvgsvTCg͖ cookie ɃANZX\ł邽߁AӂXNvg cookie ɃANZX\łB |
ANZX | ZpICpNgF̂ȂR[hR}h̎s ̏ł́ANXTCgXNveBO̐Ǝ㐫ƌѕtꍇAQ҂̃Rs[^ŔCӂ̃R[hs\܂B |
@A SA p |
ZpICpNgF̂ȂR[hR}h̎sAی상JjỶAAvP[Vf[^̓ǂݍ
XSS Ǔʂ́Ai[^ XSSAˌ^ XSS 킸łBႢ́Aǂ̂悤ɃyC[hT[oɓ͂̂ɂ܂B XSŚAQ̖̂AJEg̘R܂ŁAGh[UɂƂėlXȊ댯x̖N\܂B XSS ̐Ǝ㐫 cookie ̕spⓐɈp\ALȃ[ŨNGXgɋUNGXg쐬A@ɕsANZXA邢͗lXȕsȖړIAӂR[hGh[ŨVXeŎs܂BɁAGh[Ut@C̊JAgC̖ؔnvÕCXg[A Web y[W܂ Web TCgւ̃_CNgAMłȃTCg "Active X" Rg[̎s (Microsoft Internet Explorer ғĂꍇ)A܂̓RecN\܂B |
U\
` ɍ
U\ɂv
NXTCgXNveBOÚAȃ[U̐Mł Web TCgɑAӂ郆[UAĂȂf[^𑗐M\ȏꏊłǂłł\܂BMł Web TCgƂẮA Web x[X̃[OXg`̋@\f Web TCg܂B
uQXgubNv Web TCgł́AQXgubÑtH[ XSS ̍U\܂BU҂QXgubNւ݂̏̒ JavaScript ɂ鈫ӂR[h邱ƂŁAQXgubNy[WɃANZXl͂̃R[hsĂ܂܂B̗Ⴉ番悤ɁAXSS ̐Ǝ㐫 HTTP X|Xɕsȃf[^܂ރR[hɂȂ܂B
oi
ÓI
{Ǝ㐫o\ȎÓI̓c[gpĂBŋ߂̑̎@́AtH[X|WeBuŏ邽߂Ƀf[^t[͂gpĂ܂BɃc[ɂ錟oł́ÃR|[lg܂܂Ăꍇɂ́A100% ̐xJo[͎s\ł邽߁AȉƂ͂Ȃ܂B
LF
ubN{bNX
XSS Cheat Sheet [REF-14] gp邩Aweb AvP[Vɑ鑽lȍU{悤ȃeXgŐc[gpĂBCheat Sheet ́An XSS _I XSS ɂΉĂ܂B
LF
i[^NXTCgXNveBÓAf[^XgA邱ƂɂԐړIɖ肪邽߁AołBeXgsĺAn߂Ƀf[^XgA̒ XSS }ǍAXSS 𑼂̃[U֑MAvP[V@\TKv܂B߂ XSS f[^XgAɑ}ĂAۂɖƂȂ܂łɂ́AAԁA邢͉̎Ԃ܂B
ƎȃR[h
1:
̗͔ˌ^ XSS (^Cv1) ̃ViI \Ă܂B ȉɋLڂ JSP R[hZOg employee ID ł eid HTTP NGXgǂݎA[Uɕ\܂B
Example Language: JSP (Bad Code)
<% String eid = request.getParameter("eid"); %> ... Employee ID: <%= eid %>
ȉɌfڂ ASP.NET R[hZOǵAemployee ID io[ HTTP NGXgǂݎA[Uɕ\܂B
Example Language: ASP.NET (Bad Code)
... protected System.Web.UI.WebControls.TextBox Login; protected System.Web.UI.WebControls.Label EmployeeID; ... EmployeeID.Text = Login.Text; ... (HTML follows) ... <p><asp:label id="EmployeeID" runat="server" /></p> c
̗ŋLڂĂR[h́AEmployee ID ϐWIȉpeLXĝ݂܂ޏꍇ͐삵܂B^LN^܂̓\[XR[hlɊ܂܂ꍇAWeb uEU HTTP X|X\ۂɁÃR[hs܂B
gɑĈӂR[h URL ͂\͒Ⴂ߁AdȐƎ㐫ł͂ȂƔFꂪłBA{̊댯́AU҂ӂ URL 쐬Adq[\[VGWjAO𗘗pĔQ҂ URL ̃NɃANZX悤UނƂɂ܂BQ҂NNbNƁAmȂɐƎ㐫̂ Web AvP[VʂāAӂRecQҎg̃Rs[^ɂ͂˕ԂĂ܂B
2:
̗͊i[^ XSS (^Cv 2) ̃ViI\Ă܂B ȉɌfڂJSP R[hZOǵA^ꂽ ID ̏]ƈf[^x[Xɖ⍇Av]ƈ̖O\܂B
TvR[hFJSP ij
<% ... Statement stmt = conn.createStatement(); ResultSet rs = stmt.executeQuery("select * from emp where id="+eid); if (rs != null) { rs.next(); String name = rs.getString("name"); %> Employee Name: <%= name %>
ȉɌfڂ ASP.NET R[hZOǵA^ꂽ ID ̏]ƈf[^x[Xɖ⍇A ID ƈv]ƈ̖O\܂B
TvR[hF ASP.NET ij
protected System.Web.UI.WebControls.Label EmployeeName; ... string query = "select * from emp where id=" + eid; sda = new SqlDataAdapter(query, conn); sda.Fill(dt); string name = dt.Rows[0]["Name"]; ... EmployeeName.Text = name;
f[^x[X̃Rec̓AvP[VɂĊǗĂ悤Ɍ邽߁A name ̒lǂݍłAقNJ댯ł͂Ȃ悤ɎvꂪłBAname ̒l[Ũf[^ɂꍇAf[^x[XӂRečoHƂȂ\܂Bf[^x[XɕۑĂSẴf[^ɓKɓ͂̑ÓmFȂꍇAU҂͈ӂR}h[U Web uEUŎs\܂B
ꂽ
Q | ڍ |
---|---|
CVE-2008-5080 | Chain: protection mechanism failure allows XSS |
CVE-2006-4308 | Chain: only checks "javascript:" tag |
CVE-2007-5727 | Chain: only removes SCRIPT tags, enabling XSS |
CVE-2008-5770 | Reflected XSS using the PATH INFO in a URL |
CVE-2008-4730 | Reflected XSS not properly handled when generating an error message |
CVE-2008-5734 | Reflected XSS sent through email message. |
CVE-2008-0971 | Stored XSS in a security product. |
CVE-2008-5249 | Stored XSS using a wiki page. |
CVE-2006-3568 | Stored XSS in a guestbook application. |
CVE-2006-3211 | Stored XSS in a guestbook application using a javascript: URI in a bbcode img tag. |
CVE-2006-3295 | Chain: library file is not protected against a direct request (CWE-425), leading to reflected XSS |
Q̊ɘa
tF[YFA[LeN`ѐv
헪F CuAt[[N
{Ǝ㐫̔hA邢͖{Ǝ㐫₷\A\ɌꂽCut[[NgpĂB
KɃGR[hꂽo͂̐eՂɂ郉Cut[[N̗ƂāAMicrosoft Anti-XSS CuAOWASP ESAPI Encoding W[AApache Wicket ܂B
tF[YFA[LeN`ѐv
f[^gpwȉAъ҂GR[fBO𗝉ĂB́Aweb y[W}`p[g[̂悤ɁAقȂR|[lgԂŃf[^]ꍇA邢͓ɕ̃GR[fBO܂߂o͂ꍇAɏdvłBvGR[fBOj肷邽߂ɁASĂ̗\ʐMvgRƃf[^\ɂėĂB
web y[Wɏo͂SẴf[^iɊO̓͂SẴf[^jɂāASẲpȊOɑAKȃGR[fBOgpĂBo̓hLgłAo͂ȉ̂ǂ̉ӏɊ܂܂邩ɂāAقȂGR[fBOv܂B
EHTML body
Evf̑ (Fsrc="XYZ")
EURI
EJavaScript ZNV
EJXP[fBOX^CV[gAy style vpeBA
HTML Entity Encoding HTML body ɂĂ̂ݓKɎgp܂B
vGR[fBOGXP[v̎ނɂĂ̏ڍׂ́AXSS Prevention Cheat Sheet [REF-16] QlɂĂB
tF[YFA[LeN`ѐv
헪FUʂ̓Ək
\tgEFAɂĐMłȂ͂tӏSĔcĂB
Fp[^AcookieAlbg[NǂݍޑSāAϐAt(reverse DNS lookups)ANGʁANGXgwb_AURL R|[lgAe-mailAt@CAt@CAf[^x[XAyуAvP[VɃf[^SĂ̊OVXe
̂悤ȓ͂ API ĂяoԐړIɉčs邱ƂɒӂĂB
LFI
̎@̌ʂ͌肳Ă܂BAcookieAwb_Ahidden tH[tB[h̑ƂāANCAg̏Ԃ@T[oɕۑ邱Ƃ\ȏꍇɖ𗧂܂B
tF[YFA[LeN`ѐv
CWE-602 h߂ɁANCAgōsSẴZLeB`FbNT[ołlɍsĂ邱ƂmFĂBU҂̓`FbNsꂽƂɒlA邢̓`FbNSɏ邱ƂŁANCAg̃`FbN邱Ƃ\łB̏ꍇAꂽlT[oɑM܂B
tF[YFA[LeN`ѐv
헪Fp[^
\łAIɃf[^ƃR[hԂ̕悤ȁA\ꂽdg݂gpĂB
̂悤Ȏdg݂ɂAJ҂蓮ōsɁAo͂SẲӏɁA֘ApAGR[hA͂̑Ó`FbN̋@\Iɒ邱Ƃ\łB
tF[YF
헪Fo̓GR[fBO
SĂ web y[WɂāAISO-8859-1 ܂ UTF-8 ̕GR[fBOwApĉBGR[hw肵ĂȂƁAWeb uEU Web y[WŎgĂGR[h𐄑AقȂGR[hI\܂BɂAweb uEUɁAV[PXʂȂ̂ƂĈ킹邱ƂłAI XSS UNCAg댯܂BGR[h/GXP[vɊւɘaɂĂ CWE-116 QƂĉB
tF[YF
Struts gpꍇAtrue ɐݒ肳ꂽ bean tB^gpASẴf[^tH[ bean 珑oKv܂B
tF[YF
[ŨZbV cookie ɑ XSS Uɘa邽߁AZbV cookie HttpOnly ݒ肵ĉBHttpOnly @\T|[guEU (rIV Internet Explorer Firefox ) ɂẮAӂXNvgAdocument.cookie 𗘗pNCAg̃[ŨZbV cookie ɃANZX邱Ƃh܂BAHttpOnly ͑SẴuEUŃT|[gĂ킯ł͂Ȃ߁ASȑł͂܂BXMLHTTP NGXg⑼̋͂ȃuEŰZpAHttpOnly ̃tOݒ肳ꂽ Set-Cookie wb_ HTTP wb_ǂގiĂ邱ƂdvłB
tF[YF
SĂ͈̓͂ӂ̂̂Ƒz肵ĂBdlɌɏ]A͋zCgXggp铙Am̎Ă͂̑Ó`FbN@pĂBdlɔ͂ۂA邢͓͂dlɓK`ɕωĂBubNXgɈˑĂ܂Aӂ̂A邢͕sȓ͂TƂ݂̂ɗȂłBAubNXg͗\ǓmAɋۂׂsȓ͂肷ۂɖ𗧂܂B
͒l̑Ó`FbNہA֘AȑSĂ̗vfiA̓^CvAel͈̔́A͂̉ߕsA\A֘AtB[hԂ̈ѐAyуrWlX[̈vAjɂčlĂBrWlX[̗ƂāA"boat" ͉p܂܂Ȃߍ\IɗLłAJ҂ "red" "blue" ̂悤ȐF̖Oz肷ꍇɂ͗Lł͂ȂAƂWbN܂B
Iɍ\z web y[W̏ꍇAp[^NGXgƂė\l̕Zbg𐧌錵zCgXggpĂB[Uɂw肳p[^Ɍ炸ANGXg̑SẴf[^ (hidden tB[hAcookieAwb_AURL ) ɑĂÓmFĉB
Web TCg̕\ɎgptB[hɂÓ̊mFsȂƂɂAXSS ̐Ǝ㐫cĂ܂łBJ҂̑z肵ĂȂAvP[VT[oAvP[VANGXgf[^Ԃ邱ƂA܂AWeby[W̕\ɎgpĂȂtB[hAgp\܂B̂߁AHTTP NGXg̑SĂ̕邱Ƃ܂B
Kȏo͂̃GR[hAGXP[vANH[ǵAXSS h߂ɍłʓIȉł̂ɑA͂̑Ó`FbN͑wĥł邱ƂɒӂĂB́Aۂɏo͂eʓIɐ邩łBɔCӂ̕tAR`̃eLXgtB[hT|[gKvꍇ́ASĂ XSS ͂̑Ó`FbNŖhƂł͂܂BႦA`bgAvP[Vł́An[g̊G("<3")͈ʓIɎgĂ邽߁AÓ`FbNʉ߂悤Ɏv܂BAGXP[v₻̑̕@ŏKv̂ "<" ܂ނ߁Aweb y[Wɒڑ}邱Ƃ͕s\łB̏ꍇA"<" ̍폜ɂAXSS ̃XN邱Ƃ\łAGL^Ȃ߁AȂӂ܂\܂BׂȖɌ܂Á̖AႦΕsgp悤ȐwɊւfɂĂ͏dȖɂȂ܂B
Ó̊mFɂă~X (100 ̓̓tB[ĥ 1 Y铙) ĂAKȃGR[hfBOȂĂȂACWFNVx[X̍Uh錩݂܂BȖΏۂƂȂӏ啝ɌAKȃGR[fBOɂ͖ÃZLeB̃bg邽߁AĎ{ȂA͂ɑÓ̊mF͗LȋZpłB
AvP[V̖mȃC^[tF[Xœ͂ɑÓmFsĂ邱ƂmFĉBR|[lgōėpꂽAɈړꂽ肵ĂÃAvP[Vی삷̂ɗLłB
tF[YFA[LeN`ѐv
헪F ϊɂ鋭
t@CURL̂悤ȏɓKIuWFNgĂꍇA邢͊młꍇAŒ肵͒liIDjۂ̃t@CURL̃}bsO쐬AȊO̓͂ۂĂB
tF[YFIy[V
헪F t@CAEH[
{Ǝ㐫ɑUmAvP[Vt@CAEH[gpĂBO҂삵\tgEFAł邽߃R[hCłȂꍇȂǂɁA葍Iȃ\tgEFA̕ۏ؎iƂȂ邽߁Aً}ƂāA܂͑wh̖ړIƂČʓIłB
LF
AvP[Vt@CAEH[͑SĂ̓̓xN^[ԗ邱ƂłȂ\܂BāA͂鏈ɑĕsȌ`̓͂ɂAh䃁JjYI悤ȍsׂ\łBAvP[Vt@CAEH[̋@\ɂẮAspӂɐȃNGXgہA܂͏CĂ܂\܂BŏIIɁA蓮ɂJX^}CYKvłB
tF[YFIy[Vю
헪F ̋
PHP gpĂꍇ́Aregister_globals gpȂ悤ɃAvP[Vݒ肵ĂBɂẮA̋@\ɗȂ悤AvP[VJĂBregister_globals ̗ގ@\̎ɂĂ CWE-95ACWE-261 yїގƎ㐫̑ΏۂƂȂȂ悤xĂB
wȉڍ
ꐶ|V
ꐶ|VƂ́AuEUANZXł郊\[XA^ꂽ Web TCgŎsXNvguvANCAg Web TCgɊ֘ÂɐׂłÃTCg̃NCAg̃\[Xuvɂ̓ANZXłȂ悤ɂԂłB
ꐶ|V́ATCgA֘ÂȂTCg̃Rec̉ǂݍ݂hƂړIƂ̂łBWorld Wide Web́ÃTCgƒʐM邽߁Ã|VuEUɋ邱Ƃ͏dvłB
hC
XSS QƂۂ Web TCg̃hĆANCAg̐ڑĂ֘A\[XɂقړȂ܂B܂ÃhĆAuEŨTCgɒʐMĕۑĂSẴ\[Xƍl܂B
ɂ鑼̐Ǝ㐫Ƃ̈ˑW
ˑW | ڍ |
---|---|
ˑI | ̐Ǝ㐫݂邱Ƃɂ蔭 |
W
Nature | Type | ID | Name | View(s) this relationship pertains to | Named Chain(s) this relationship pertains to |
---|---|---|---|---|---|
ChildOf | Weakness Class | 20 | Improper Input Validation | Seven Pernicious Kingdoms (primary)700 | |
ChildOf | Weakness Class | 74 | Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') | Seven Pernicious Kingdoms (primary)700 | |
Research Concepts (primary)1000 | |||||
ChildOf | Category | 442 | Web Problems | Development Concepts699 | |
ChildOf | Category | 712 | OWASP Top Ten 2007 Category A1 - Cross Site Scripting (XSS) | Weaknesses in OWASP Top Ten (2007) (primary)629 | |
ChildOf | Category | 722 | OWASP Top Ten 2004 Category A1 - Unvalidated Input | Weaknesses in OWASP Top Ten (2004)711 | |
ChildOf | Category | 725 | OWASP Top Ten 2004 Category A4 - Cross-Site Scripting (XSS) Flaws | Weaknesses in OWASP Top Ten (2004) (primary)711 | |
ChildOf | Category | 751 | 2009 Top 25 - Insecure Interaction Between Components | Weaknesses in the 2009 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)750 | |
ChildOf | Category | 801 | 2010 Top 25 - Insecure Interaction Between Components | Weaknesses in the 2010 CWE/SANS Top 25 Most Dangerous Programming Errors(primary)800 | |
ChildOf | Category | 811 | OWASP Top Ten 2010 Category A2 - Cross-Site Scripting (XSS) | Weaknesses in OWASP Top Ten (2010)(primary)809 | |
CanPrecede | Weakness Base | 494 | Download of Code Without Integrity Check | Research Concepts1000 | |
PeerOf | Compound Element: Composite | 352 | Cross-Site Request Forgery (CSRF) | Research Concepts1000 | |
ParentOf | Weakness Variant | 80 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) | Development Concepts (primary)699 | |
Research Concepts (primary)1000 | |||||
ParentOf | Weakness Variant | 81 | Improper Neutralization of Script in an Error Message Web Page | Development Concepts (primary)699 | |
Research Concepts (primary)1000 | |||||
ParentOf | Weakness Variant | 83 | Improper Neutralization of Script in Attributes in a Web Page | Development Concepts (primary)699 | |
Research Concepts (primary)1000 | |||||
ParentOf | Weakness Variant | 84 | Improper Neutralization of Encoded URI Schemes in a Web Page | Development Concepts (primary)699 | |
Research Concepts (primary)1000 | |||||
ParentOf | Weakness Variant | 85 | Doubled Character XSS Manipulations | Development Concepts (primary)699 | |
Research Concepts (primary)1000 | |||||
ParentOf | Weakness Variant | 86 | Improper Neutralization of Invalid Characters in Identifiers in Web Pages | Development Concepts (primary)699 | |
Research Concepts (primary)1000 | |||||
ParentOf | Weakness Variant | 87 | Improper Neutralization of Alternate XSS Syntax | Development Concepts (primary)699 | |
Research Concepts (primary)1000 | |||||
MemberOf | View | 635 | Weaknesses Used by NVD | Weaknesses Used by NVD (primary)635 | |
CanFollow | Weakness Base | 113 | Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') | Research Concepts1000 | |
CanFollow | Weakness Base | 184 | Incomplete Blacklist | Research Concepts1000 | Incomplete Blacklist to Cross-Site Scripting692 |
̐
m
gDł̕
gD܂͑gDł̕ | m[h ID | CWE̕ނƂ̓Kx | ޖ |
---|---|---|---|
PLOVER | Cross-site scripting (XSS) | ||
7 Pernicious Kingdoms | Cross-site Scripting | ||
CLASP | Cross-site scripting | ||
OWASP Top Ten 2007 | A1 | Cross Site Scripting (XSS) | |
OWASP Top Ten 2004 | A1 | CWE ̕ڍ | Unvalidated Input |
OWASP Top Ten 2004 | A4 | Cross-Site Scripting (XSS) Flaws | |
WASC | 8 | Cross-site Scripting |
֘AUp^[
CAPEC-ID | Up^[ (CAPEC Version 1.1) |
---|---|
232 | Exploitation of Privilege/Trust |
85 | Client Network Footprinting (using AJAX/XSS) |
86 | Embedding Script (XSS ) in HTTP Headers |
32 | Embedding Scripts in HTTP Query Strings |
18 | Embedding Scripts in Nonscript Elements |
19 | Embedding Scripts within Scripts |
63 | Simple Script Injection |
91 | XSS in IMG Tags |
106 | Cross Site Scripting through Log Files |
198 | Cross-Site Scripting in Error Pages |
199 | Cross-Site Scripting Using Alternate Syntax |
209 | Cross-Site Scripting Using MIME Type Mismatch |
243 | Cross-Site Scripting in Attributes |
244 | Cross-Site Scripting via Encoded URI Schemes |
245 | Cross-Site Scripting Using Doubled Characters, e.g. %3C%3Cscript |
246 | Cross-Site Scripting Using Flash |
247 | Cross-Site Scripting with Masking through Invalid Characters in Identifiers |
Q
[REF-15] Jeremiah Grossman, Robert "RSnake" Hansen, Petko "pdp" D. Petkov, Anton Rager and Seth Fogie. "XSS Attacks". Syngress. 2007. Attacks". Syngress. 2007.
[REF-17] Michael Howard, David LeBlanc and John Viega. "24 Deadly Sins of Software Security". "Sin 2: Web-Server Related Vulnerabilities (XSS, XSRF, and Response Splitting)." Page 31. McGraw-Hill. 2010.
[REF-17] Michael Howard, David LeBlanc and John Viega. "24 Deadly Sins of Software Security". "Sin 3: Web-Client Related Vulnerabilities (XSS)." Page 63. McGraw-Hill. 2010.
"Cross-site scripting". Wikipedia. 2008-08-26. <http://en.wikipedia.org/wiki/Cross-site_scripting>. "Cross-site scripting". Wikipedia. 2008-08-26. <http://en.wikipedia.org/wiki/Cross-site_scripting>. "Cross-site scripting". Wikipedia. 2008-08-26. <http://en.wikipedia.org/wiki/Cross-site_scripting>. "Cross-site scripting". Wikipedia. 2008-08-26. <http://en.wikipedia.org/wiki/Cross-site_scripting>. "Cross-site scripting". Wikipedia. 2008-08-26. <http://en.wikipedia.org/wiki/Cross-site_scripting>.
[REF-11] M. Howard and D. LeBlanc. "Writing Secure Code". Chapter 13, "Web-Specific Input Issues" Page 413. 2nd Edition. Microsoft. 2002. M. Howard and D. LeBlanc. "Writing Secure Code". 2nd Edition. Microsoft. 2003. M. Howard and D. LeBlanc. "Writing Secure Code". 2nd Edition. Microsoft. 2003. M. Howard and D. LeBlanc. "Writing Secure Code". 2nd Edition. Microsoft. 2003. M. Howard and D. LeBlanc. "Writing Secure Code". 2nd Edition. Microsoft. 2003.
[REF-14] RSnake. "XSS (Cross Site Scripting) Cheat Sheet". <http://ha.ckers.org/xss.html>. RSnake. "XSS (Cross Site Scripting) Cheat Sheet". <http://ha.ckers.org/xss.html>. RSnake. "XSS (Cross Site Scripting) Cheat Sheet". <http://ha.ckers.org/xss.html>. RSnake. "XSS (Cross Site Scripting) Cheat Sheet". <http://ha.ckers.org/xss.html>. RSnake. "XSS (Cross Site Scripting) Cheat Sheet". <http://ha.ckers.org/xss.html>.
Microsoft. "Mitigating Cross-site Scripting With HTTP-only Cookies". <http://msdn.microsoft.com/en-us/library/ms533046.aspx>. Microsoft. "Mitigating Cross-site Scripting With HTTP-only Cookies". <http://msdn.microsoft.com/en-us/library/ms533046.aspx>. Microsoft. "Mitigating Cross-site Scripting With HTTP-only Cookies". <http://msdn.microsoft.com/en-us/library/ms533046.aspx>. Microsoft. "Mitigating Cross-site Scripting With HTTP-only Cookies". <http://msdn.microsoft.com/en-us/library/ms533046.aspx>. Microsoft. "Mitigating Cross-site Scripting With HTTP-only Cookies". <http://msdn.microsoft.com/en-us/library/ms533046.aspx>.
Mark Curphey, Microsoft. "Anti-XSS 3.0 Beta and CAT.NET Community Technology Preview now Live!". <http://blogs.msdn.com/cisg/archive/2008/12/15/anti-xss-3-0-beta-and-cat-net-community-technology-preview-now-live.aspx>. Mark Curphey, Microsoft. "Anti-XSS 3.0 Beta and CAT.NET Community Technology Preview now Live!". <http://blogs.msdn.com/cisg/archive/2008/12/15/anti-xss-3-0-beta-and-cat-net-community-technology-preview-now-live.aspx>. Mark Curphey, Microsoft. "Anti-XSS 3.0 Beta and CAT.NET Community Technology Preview now Live!". <http://blogs.msdn.com/cisg/archive/2008/12/15/anti-xss-3-0-beta-and-cat-net-community-technology-preview-now-live.aspx>. Mark Curphey, Microsoft. "Anti-XSS 3.0 Beta and CAT.NET Community Technology Preview now Live!". <http://blogs.msdn.com/cisg/archive/2008/12/15/anti-xss-3-0-beta-and-cat-net-community-technology-preview-now-live.aspx>. Mark Curphey, Microsoft. "Anti-XSS 3.0 Beta and CAT.NET Community Technology Preview now Live!". <http://blogs.msdn.com/cisg/archive/2008/12/15/anti-xss-3-0-beta-and-cat-net-community-technology-preview-now-live.aspx>.
"OWASP Enterprise Security API (ESAPI) Project". <http://www.owasp.org/index.php/ESAPI>. "OWASP Enterprise Security API (ESAPI) Project". <http://www.owasp.org/index.php/ESAPI>. "OWASP Enterprise Security API (ESAPI) Project". <http://www.owasp.org/index.php/ESAPI>. "OWASP Enterprise Security API (ESAPI) Project". <http://www.owasp.org/index.php/ESAPI>. "OWASP Enterprise Security API (ESAPI) Project". <http://www.owasp.org/index.php/ESAPI>.
Ivan Ristic. "XSS Defense HOWTO". <http://blog.modsecurity.org/2008/07/do-you-know-how.html>. Ivan Ristic. "XSS Defense HOWTO". <http://blog.modsecurity.org/2008/07/do-you-know-how.html>. Ivan Ristic. "XSS Defense HOWTO". <http://blog.modsecurity.org/2008/07/do-you-know-how.html>. Ivan Ristic. "XSS Defense HOWTO". <http://blog.modsecurity.org/2008/07/do-you-know-how.html>. Ivan Ristic. "XSS Defense HOWTO". <http://blog.modsecurity.org/2008/07/do-you-know-how.html>.
OWASP. "Web Application Firewall". <http://www.owasp.org/index.php/Web_Application_Firewall>. OWASP. "Web Application Firewall". <http://www.owasp.org/index.php/Web_Application_Firewall>. OWASP. "Web Application Firewall". <http://www.owasp.org/index.php/Web_Application_Firewall>. OWASP. "Web Application Firewall". <http://www.owasp.org/index.php/Web_Application_Firewall>. OWASP. "Web Application Firewall". <http://www.owasp.org/index.php/Web_Application_Firewall>.
Web Application Security Consortium. "Web Application Firewall Evaluation Criteria". <http://www.webappsec.org/projects/wafec/v1/wasc-wafec-v1.0.html>. Web Application Security Consortium. "Web Application Firewall Evaluation Criteria". <http://www.webappsec.org/projects/wafec/v1/wasc-wafec-v1.0.html>. Web Application Security Consortium. "Web Application Firewall Evaluation Criteria". <http://www.webappsec.org/projects/wafec/v1/wasc-wafec-v1.0.html>. Web Application Security Consortium. "Web Application Firewall Evaluation Criteria". <http://www.webappsec.org/projects/wafec/v1/wasc-wafec-v1.0.html>. Web Application Security Consortium. "Web Application Firewall Evaluation Criteria". <http://www.webappsec.org/projects/wafec/v1/wasc-wafec-v1.0.html>.
RSnake. "Firefox Implements httpOnly And is Vulnerable to XMLHTTPRequest". 2007-07-19. RSnake. "Firefox Implements httpOnly And is Vulnerable to XMLHTTPRequest". 2007-07-19. RSnake. "Firefox Implements httpOnly And is Vulnerable to XMLHTTPRequest". 2007-07-19. RSnake. "Firefox Implements httpOnly And is Vulnerable to XMLHTTPRequest". 2007-07-19. RSnake. "Firefox Implements httpOnly And is Vulnerable to XMLHTTPRequest". 2007-07-19.
"XMLHttpRequest allows reading HTTPOnly cookies". Mozilla. <https://bugzilla.mozilla.org/show_bug.cgi?id=380418>. "XMLHttpRequest allows reading HTTPOnly cookies". Mozilla. <https://bugzilla.mozilla.org/show_bug.cgi?id=380418>. "XMLHttpRequest allows reading HTTPOnly cookies". Mozilla. <https://bugzilla.mozilla.org/show_bug.cgi?id=380418>. "XMLHttpRequest allows reading HTTPOnly cookies". Mozilla. <https://bugzilla.mozilla.org/show_bug.cgi?id=380418>. "XMLHttpRequest allows reading HTTPOnly cookies". Mozilla. <https://bugzilla.mozilla.org/show_bug.cgi?id=380418>.
"Apache Wicket". <http://wicket.apache.org/>.
[REF-16] OWASP. "XSS (Cross Site Scripting) Prevention Cheat Sheet". <http://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet>. "XMLHttpRequest allows reading HTTPOnly cookies". Mozilla. <https://bugzilla.mozilla.org/show_bug.cgi?id=380418>. "XMLHttpRequest allows reading HTTPOnly cookies". Mozilla. <https://bugzilla.mozilla.org/show_bug.cgi?id=380418>. "XMLHttpRequest allows reading HTTPOnly cookies". Mozilla. <https://bugzilla.mozilla.org/show_bug.cgi?id=380418>. "XMLHttpRequest allows reading HTTPOnly cookies". Mozilla. <https://bugzilla.mozilla.org/show_bug.cgi?id=380418>.
Jason Lam. "Top 25 series - Rank 1 - Cross Site Scripting". SANS Software Security Institute. 2010-02-22. <http://blogs.sans.org/appsecstreetfighter/2010/02/22/top-25-series-rank-1-cross-site-scripting/>. "Apache Wicket". <http://wicket.apache.org/>. "Apache Wicket". <http://wicket.apache.org/>. "Apache Wicket". <http://wicket.apache.org/>. "Apache Wicket". <http://wicket.apache.org/>.
XV
[2011N0421]
2010N1012_̃f[^ɍXV
[2009N0629]
2009N0202_̉L URL ɍ쐬
http://cwe.mitre.org/data/definitions/79.html
o^ 2011/04/21
ŏIXV 2023/04/04