Skip to content

Latest commit

 

History

History
24 lines (17 loc) · 829 Bytes

README.md

File metadata and controls

24 lines (17 loc) · 829 Bytes

A threat actor may inject malicious content where content is saved into a database, when users visit the malicious vulnerable website, the malicious content is loaded from the database and the browser executes that.

Example #1

  1. Threat actor infects a vulnerable target with malicious code to a victim
  2. The victim requests the vulnerable target and receives the malicious code
  3. When malicious code gets executed, it calls back the threat actor

Impact

Vary

Risk

  • Read & modify data

Redemption

  • Output encoding
  • Browser built-in XSS preveiton

ID

cb251c97-067d-4f13-8195-4f918273f41b

References