Also question is, what is the difference between reflected and stored XSS vulnerabilities?
Stored XSS means that some persistant data (typically stored in a database) are not sanitized in a page, which implies that everyone can be affected by the vulnerability. Reflected XSS, on the contrary, means that non-persistent data (generally data provided by the client through form submission) are not escaped.
Subsequently, question is, what may an attacker achieve using reflected XSS? Impact of reflected XSS attacks
Amongst other things, the attacker can: Perform any action within the application that the user can perform. View any information that the user is able to view. Modify any information that the user is able to modify.
Secondly, what is a reflected XSS?
Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off of a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts.
What are the common defenses against XSS?
5 Answers
- Specifying a charset.
- HTML escaping.
- Other types of escaping.
- Validating URLs and CSS values.
- Not allowing user-provided HTML.
- Preventing DOM-based XSS.