A threat actor may inject malicious content into HTTP requests. The content is not reflected in the HTTP response and executed in the victim's browser.
- Threat actor crafts an email with a malicious request to a vulnerable target and sends the email to a victim
- The victim clicks on the email and sends the request to the vulnerable target
- The target sends the malicious code back to the victim
- The victim's browser inserts the malicious code
- When malicious code gets executed, it calls back the threat actor
Vary
- Read & modify data
- Client input validation
- Output encoding
- Browser built-in XSS preveiton
cb251c97-067d-4f13-8195-4f918273f41b