| Home > CAPEC List > CAPEC-243: XSS Targeting HTML Attributes (Version 3.9) |
|
Medium
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. | 588 | DOM-Based XSS |
| ChildOf | Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. | 591 | Reflected XSS |
| ChildOf | Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. | 592 | Stored XSS |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software |
| Mechanisms of Attack | Inject Unexpected Items |
Survey the application for user-controllable inputs: Using a browser or an automated tool, an adversary follows all public links and actions on a web site. They record all the links, the forms, the resources accessed and all other potential entry-points for the web application.
| Techniques |
|---|
| Use a spidering tool to follow and record all links and analyze the web pages to find entry points. Make special note of any links that include parameters in the URL. |
| Use a proxy tool to record all links visited during a manual traversal of the web application. |
| Use a browser to manually explore the website and analyze how it is constructed. Many browsers' plugins are available to facilitate the analysis or automate the discovery. |
Probe identified potential entry points for XSS targeting HTML attributes: The adversary uses the entry points gathered in the "Explore" phase as a target list and injects various malicious expressions as input, hoping to embed them as HTML attributes.
| Techniques |
|---|
| Inject single and double quotes into URL parameters or other inputs to see if they are filtered out. Also use URL encoding to bypass filters. |
| Use single or double quotes to close attribute evaluation and enter a new attribute that contains an expression. |
Craft malicious XSS URL: Once the adversary has determined which parameters are vulnerable to XSS, they will craft a malicious URL containing the XSS exploit. The adversary can have many goals, from stealing session IDs, cookies, credentials, and page content from the victim.
| Techniques |
|---|
| Execute a script using an expression embedded in an HTML attribute, which avoids needing to inject a script tag. |
| Send information gathered from the malicious script to a remote endpoint. |
Get victim to click URL: In order for the attack to be successful, the victim needs to access the malicious URL.
| Techniques |
|---|
| Send a phishing email to the victim containing the malicious URL. This can be hidden in a hyperlink as to not show the full URL, which might draw suspicion. |
| Put the malicious URL on a public forum, where many victims might accidentally click the link. |
| CWE-ID | Weakness Name |
|---|---|
| 83 | Improper Neutralization of Script in Attributes in a Web Page |
| Submissions | |||
|---|---|---|---|
| Submission Date | Submitter | Organization | |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | |
| Modifications | |||
| Modification Date | Modifier | Organization | |
| 2017年05月01日 (Version 2.10) | CAPEC Content Team | The MITRE Corporation | |
| Updated Description Summary, Related_Attack_Patterns, Related_Weaknesses | |||
| 2018年07月31日 (Version 2.12) | CAPEC Content Team | The MITRE Corporation | |
| Updated Description Summary | |||
| 2020年07月30日 (Version 3.3) | CAPEC Content Team | The MITRE Corporation | |
| Updated Mitigations | |||
| 2022年02月22日 (Version 3.7) | CAPEC Content Team | The MITRE Corporation | |
| Updated Execution_Flow, Resources_Required | |||
| Previous Entry Names | |||
| Change Date | Previous Entry Name | ||
| 2017年05月01日 (Version 2.10) | Cross-Site Scripting in Attributes | ||
| 2018年07月31日 (Version 2.12) | XSS Targetting HTML Attributes | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||