5

DOM-based XSS is so poorly documented. I already know what reflected and stored XSS are.

1

3 Answers 3

4

Here are good resources for it:

DOM Based XSS (or as it is called in some texts, “type-0 XSS”) is an XSS attack wherein the attack payload is executed as a result of modifying the DOM “environment” in the victim’s browser used by the original client side script, so that the client side code runs in an “unexpected” manner. That is, the page itself (the HTTP response that is) does not change, but the client side code contained in the page executes differently due to the malicious modifications that have occurred in the DOM environment.

3
  • So is DOM-based XSS like a "JavaScript injection"?
    – Donald T
    Commented Nov 29, 2010 at 18:13
  • 1
    @DT: Yes client side code is used in such manner for the malacious purpose.
    – Sarfraz
    Commented Nov 29, 2010 at 18:25
  • @DT3, not exactly - its not injecting javascript, but forcing the existing javascript to inject [script into itself | HTML into the webpage].
    – AviD
    Commented Nov 30, 2010 at 10:30
3

See http://www.owasp.org/index.php/DOM_Based_XSS

Basically, it's an attack aganist client-side scripts that fetch data from GET strings, the url, the fragment identifier or something like that and put it into the page without escaping it.

2

There's a good description and example at OWASP

Your Answer

By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy.

Not the answer you're looking for? Browse other questions tagged or ask your own question.