Skip to content

Commit

Permalink
Consistent case for bullets
Browse files Browse the repository at this point in the history
  • Loading branch information
wbamberg committed Dec 12, 2024
1 parent 1bada9d commit fa40431
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions files/en-us/web/security/attacks/xss/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,15 +14,15 @@ A web browser downloads code from many different websites and runs it on the use

In a successful XSS attack, the attacker is able to subvert the same-origin policy by tricking the target site into executing malicious code within its own context, as though it were same-origin. The code can then do anything that the site's own code can do, including, for example:

- access and/or modify all the content of the site's loaded pages, and any content in local storage
- make HTTP requests with the user's credentials, enabling them to impersonate the user or access sensitive data
- Access and/or modify all the content of the site's loaded pages, and any content in local storage
- Make HTTP requests with the user's credentials, enabling them to impersonate the user or access sensitive data

![Diagram of attacker code running in target website](xss.svg)

All XSS attacks depend on a website doing two things:

1. accepting some input that could have been crafted by an attacker
2. including this input in a page without _sanitizing_ it: that is, without ensuring that it won't be executable as JavaScript.
1. Accepting some input that could have been crafted by an attacker
2. Including this input in a page without _sanitizing_ it: that is, without ensuring that it won't be executable as JavaScript.

## Two XSS examples

Expand Down

0 comments on commit fa40431

Please sign in to comment.