s4n7h0 / xvwa

XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security.
GNU General Public License v3.0
1.69k stars 339 forks source link

Stored Cross Site Scripting (XSS) fix #5

Closed ad-m closed 8 years ago

ad-m commented 8 years ago

Hello,

I am would like recommend to fix Stored Cross Site Scripting flaw.

Stored Cross Site Scripting attacks happen when the application doesn’t validate user inputs against malicious scripts, and it occurs when these scripts get stored on the database. Victim gets infected when they visit web page that loads these malicious scripts from database. For instances, message forum, comments page, visitor logs, profile page, etc.

Read more about Stored XSS: https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)#Stored_XSS_Attacks

I am glad that I helped to make web more secure. Merge please.

Greetings,

mik-laj commented 8 years ago

I do not understand why you call me.

ad-m commented 8 years ago

@mik-laj , I don't understand what do you want here. I hope that helped.

s4n7h0 commented 8 years ago

hey @ad-m the idea of this application is to understand XSS issues, try exploit them, and see what went wrong in the code. It's basically an application that can help security enthusiast to learn application security. I appreciate your intention though. Would be great if you want to write a simple blog post, how you observe the bad code here, exploited the it, and fixed the same ;)