php - XSS in URI in page without any input -


is xss attack made user input? have recived attacks this:

'"--></style></script><script>alert(0x002357)</script> 

when scanning php page without html content acunetix or netsparker.

thanks in advance

remember if had static collection of html files without server-side or or client-side scripting whatsoever, may still store logs in sql database or watch them html using log analyzer may vulnerable kind of uris. have seen uris in logs using escape sequences run malicious command in command line terminals – google escape sequence injection , may surprised how popular are. attacking web-based log analyzing tools more common – google log injection. not saying particular attack targeted @ logs i'm saying not displaying user input on web pages doesn't mean safe malicious payloads in uris.


Comments

Popular posts from this blog

linux - Mailx and Gmail nss config dir -

c# - Is it possible to remove an existing registration from Autofac container builder? -

php - Mysql PK and FK char(36) vs int(10) -