DOM-based XSS is so poorly documented. I already know what reflected and stored XSS are.
3 Answers
Here are good resources for it:
DOM Based XSS (or as it is called in some texts, “type-0 XSS”) is an XSS attack wherein the attack payload is executed as a result of modifying the DOM “environment” in the victim’s browser used by the original client side script, so that the client side code runs in an “unexpected” manner. That is, the page itself (the HTTP response that is) does not change, but the client side code contained in the page executes differently due to the malicious modifications that have occurred in the DOM environment.
-
-
1@DT: Yes client side code is used in such manner for the malacious purpose.– SarfrazCommented Nov 29, 2010 at 18:25
-
@DT3, not exactly - its not injecting javascript, but forcing the existing javascript to inject [script into itself | HTML into the webpage].– AviDCommented Nov 30, 2010 at 10:30
See http://www.owasp.org/index.php/DOM_Based_XSS
Basically, it's an attack aganist client-side scripts that fetch data from GET strings, the url, the fragment identifier or something like that and put it into the page without escaping it.