security - XSS as attack vector even if XSS data not stored? -


I have a question about XSS

What forms for XSS as a vector Can be used even if the data is not stored in the database and used later?

i.e. Php will contain the code:

   

A alert box with the above code (displays that JS can be run) is trivial on your browser. But is it also useful in browsers? The only scenario I am looking for, where you trick someone to go to a certain page, i.e. a combination of CSRF and XSS.

"Stored and used later in a database": The scenario that I understand about CSS is the place where you can post data to a site that runs Javascript and Shown on a page in a browser that is more of your own privileges. But, it is clear that it is not wat I'm talking about above.

Yes, it's still an attack vector.

What do you need to consider:

Can a certified user deceive in viewing this page with malicious data created?

Answer This is the case yes (assuming you are a certified user). Because it is possible to send someone to your site and pass in that area into malicious variables.


Comments

Popular posts from this blog

windows - Heroku throws SQLITE3 Read only exception -

lex - Building a lexical Analyzer in Java -

python - rename keys in a dictionary -