Input Validation Cheat Sheet

本文深入探讨了SQL注入攻击的原理与测试方法,包括使用各种字符进行注入实验,如NULL、{'、{–等,并通过实例展示了如何利用这些字符进行基本的跨站脚本检查和格式字符串漏洞测试。

Related articles: SQL Injection Cheat Sheet

We sometimes carelessly throw characters up and about in an attempt to find a gem. This paper covers miscellaneous injection characters and their meanings when applied to web application testing.

<!--adsense-->

Character(s)Details
NULL or nullOften produces interesting error messages as the web application is expecting a value. It can also help us determine if the backend is a PL/SQL gateway.
{&apos; , " , ; , <!}Breaks an SQL string or query; used for SQL, XPath and XML Injection tests.
{– , = , + , "}These characters are used to craft SQL Injection queries.
{‘ , &, ! , ¦ , < , >}Used to find command execution vulnerabilities.
"><script>alert(1)</script>Used for basic Cross-Site Scripting Checks.
{%0d , %0a}Carriage Return Line Feed (new line); all round bad.
{%7f , %ff}byte-length overflows; maximum 7- and 8-bit values.
{-1, other}Integer and underflow vulnerabilities.
Ax1024+Overflow vulnerabilities.
{%n , %x , %s}Testing for format string vulnerabilities.
../Directory Traversal Vulnerabilities.
{% , _, *}Wildcard characters can sometimes present DoS issues or information disclosure.

These characters can be represented in many different ways (i.e. Unicode). It is important to understand this when restricting input to these character sets.

References:

Severity Threat level High High Vulnerability Status Comment No comment provided. [Edit] Confidence 95% URL common.external-linkhttps://hangzhou.hibaacademy.org.cn/ Attack Detailscommon.up URI was set to "onmouseover='xofP(90442)'bad=" The input is reflected inside a tag parameter between double quotes. Vulnerability Descriptioncommon.up Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts into a legitimate website or web application. XSS occurs when a web application makes use of unvalidated or unencoded user input within the output it generates. Discovered by /Scripts/PerFile/XSS_in_URI_File.script The impact of this vulnerabilitycommon.up Malicious JavaScript has access to all the same objects as the rest of the web page, including access to cookies and local storage, which are often used to store session tokens. If an attacker can obtain a user's session cookie, they can then impersonate that user. Furthermore, JavaScript can read and make arbitrary modifications to the contents of a page being displayed to a user. Therefore, XSS in conjunction with some clever social engineering opens up a lot of possibilities for an attacker. How to fix this vulnerabilitycommon.up Apply context-dependent encoding and/or validation to user input rendered on a page Classificationcommon.up CWE CWE-79 CVSS v3.0 Base Score: 5.3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Attack Vector: Network Attack Complexity: Low Privileges Required: None User Interaction: None Scope: Unchanged Confidentiality: None Integrity: Low Availability: None CVSS v4.0 Base Score: 5.1 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N Attack Vector: Network Attack Complexity: Low Privileges Required: None User Interaction: None Scope: Unchanged Confidentiality: None Integrity: Low Availability: None Web Referencescommon.up Cross-site Scripting (XSS) Attack - Acunetix Types of XSS - Acunetix XSS Filter Evasion Cheat Sheet Excess XSS, a comprehensive tutorial on cross-site scripting Cross site scripting
最新发布
10-06
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值