Top 10 2010-A2-Cross-Site Scripting (XSS)

You need to ensure that all user supplied input sent back to the browser is verified to be safe (via input validation), and that user input is properly escaped before it is included in the output page. Proper output encoding ensures that such input is always treated as text in the browser, rather than active content that might get executed.

Both static and dynamic tools can find some XSS problems automatically. However, each application builds output pages differently and uses different browser side interpreters such as JavaScript, ActiveX, Flash, and Silverlight, which makes automated detection difficult. Therefore, complete coverage requires a combination of manual code review and manual penetration testing, in addition to any automated approaches in use.

Web 2.0 technologies, such as AJAX, make XSS much more difficult to detect via automated tools.

Preventing XSS requires keeping untrusted data separate from active browser content.
 * 1) The preferred option is to properly escape all untrusted data based on the HTML context (body, attribute, JavaScript, CSS, or URL) that the data will be placed into. Developers need to include this escaping in their applications unless their UI framework does this for them. See the  OWASP XSS Prevention Cheat Sheet for more information about data escaping techniques.
 * 2) Positive or “whitelist” input validation with appropriate canonicalization and decoding is also recommended as it helps protect against XSS, but is not a complete defense as many applications require special characters in their input. Such validation should, as much as possible, decode any encoded input, and then validate the length, characters, format, and any business rules on that data before accepting the input.

The application uses untrusted data in the construction of the following HTML snippet without validation or escaping:
 * [[File:Xss-snippet-1.png]]

The attacker modifies the ‘CC’ parameter in their browser to:
 * [[File:Xss-snippet-2.png]]

This causes the victim’s session ID to be sent to the attacker’s website, allowing the attacker to hijack the user’s current session.

Note that attackers can also use XSS to defeat any automated CSRF defense the application might employ. See A5 for info on CSRF.


 * OWASP XSS Prevention Cheat Sheet
 * OWASP Cross-Site Scripting Article
 * ESAPI Project Home Page
 * ESAPI Encoder API
 * ASVS: Output Encoding/Escaping Requirements (V6)
 * ASVS: Input Validation Requirements (V5)
 * Testing Guide: 1st 3 Chapters on Data Validation Testing
 * OWASP Code Review Guide: Chapter on XSS Review


 * CWE Entry 79 on Cross-Site Scripting
 * RSnake's XSS Attack Cheat Sheet