Jump to content

Cross-site scripting

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Grunt (talk | contribs) at 21:01, 10 September 2004 (Reverted edits by 4.159.41.232 to last version by 66.98.132.3). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Cross site scripting (XSS) is a type of computer security exploit where information from one context, where it is not trusted, can be inserted into another context, where it is. From the trusted context, an attack can be launched.

A classic example of cross site scripting is to supply parameters to a CGI script on a web site which cause the web site to emit bogus data. For example, the use of HTML client-side scripting language fragments in a web page parameter may insert this information into the rendered page, resulting in targeted web browsers executing the code.

This may be done by entering data into a web form on the site, for example as part of a bulletin board feature, or by publicly posting a URL which users are likely to click on, for example in E-mails or Usenet.

The name "cross site" derives from the way the attack is directed "across" the web-site, from the attacking data source to the attacked browser.

Note: Cross site scripting is also sometimes abbreviated "CSS", but has nothing to do with the cascading style sheet technology that is more commonly called CSS.

See also

加一句汉语!