close ad
Install the LAtest Updates to Work with CC 2017 and CC 2018
open ad
View Menu

Technical Support Forums

Free, outstanding support from WebAssist and your colleagues

XSS issue: scan result says the scripts are vulnerable but cannot tell where

Thread began 11/10/2017 5:53 am by rikaG_510 | Last modified 11/15/2017 9:20 am by rikaG_510 | 19 views | 2 replies

Ray BorduinWebAssist

This is because you are displaying form values on the page directly like this:
<?php echo((isset($_POST["Full_Name"]))?$_POST["Full_Name"]:"") ?>

Users could put some code other than their Full_Name when they fill out the form and then the code would run on the page. You may actually be preventing this with server side validation, but there is no way for your testing software to know that.

You can fix these errors by using:

php:
<?php echo((isset($_POST["Full_Name"]))?htmlspecialchars($_POST["Full_Name"]):""?>



the htmlspecialchars() function would encode anything that would allow cross site scripting.

The bad news is that this isn't how someone uploaded malicious files and hacked you. XSS allows users to get sensitive data from your customers like cookies but it isn't the type of vulnerably that opens the door to a full hack. This is worth correcting on the pages, but won't solve your larger issue.

Build websites with a little help from your friends

Your friends over here at WebAssist! These Dreamweaver extensions will assist you in building unlimited, custom websites.

Build websites from already-built web applications

These out-of-the-box solutions provide you proven, tested applications that can be up and running now.  Build a store, a gallery, or a web-based email solution.

Want your website pre-built and hosted?

Close Windowclose

Rate your experience or provide feedback on this page

Account or customer service questions?
Please user our contact form.

Need technical support?
Please visit support to ask a question

Content

rating

Layout

rating

Ease of use

rating

security code refresh image

We do not respond to comments submitted from this page directly, but we do read and analyze any feedback and will use it to help make your experience better in the future.

Close Windowclose

We were unable to retrieve the attached file

Close Windowclose

Attach and remove files

add attachmentAdd attachment
Close Windowclose

Enter the URL you would like to link to in your post

Close Windowclose

This is how you use right click RTF editing

Enable right click RTF editing option allows you to add html markup into your tutorial such as images, bulleted lists, files and more...

-- click to close --

Uploading file...