Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-82:Improper Neutralization of Script in Attributes of IMG Tags in a Web Page
Weakness ID:82
Version:v4.17
Weakness Name:Improper Neutralization of Script in Attributes of IMG Tags in a Web Page
Vulnerability Mapping:Allowed
Abstraction:Variant
Structure:Simple
Status:Incomplete
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

The web application does not neutralize or incorrectly neutralizes scripting elements within attributes of HTML IMG tags, such as the src attribute.

▼Extended Description

Attackers can embed XSS exploits into the values for IMG attributes (e.g. SRC) that is streamed and then executed in a victim's browser. Note that when the page is loaded into a user's browsers, the exploit will automatically execute.

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
ChildOfAllowedV83Improper Neutralization of Script in Attributes in a Web Page
Nature: ChildOf
Mapping: Allowed
Type: Variant
ID: 83
Name: Improper Neutralization of Script in Attributes in a Web Page
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC990SFP Secondary Cluster: Tainted Input to Command
MemberOfProhibitedC1409Comprehensive Categorization: Injection
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 990
Name: SFP Secondary Cluster: Tainted Input to Command
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1409
Name: Comprehensive Categorization: Injection
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-284Output Encoding Strategy
MemberOfProhibitedBSBOSS-286Attack Surface Reduction Strategy
MemberOfProhibitedBSBOSS-294Not Language-Specific Weaknesses
MemberOfProhibitedBSBOSS-311Execute Unauthorized Code or Commands (impact)
MemberOfProhibitedBSBOSS-328Read Application Data (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-284
Name: Output Encoding Strategy
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-286
Name: Attack Surface Reduction Strategy
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-294
Name: Not Language-Specific Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-311
Name: Execute Unauthorized Code or Commands (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-328
Name: Read Application Data (impact)
▼Relevant To View
Relevant to the view"Software Fault Pattern (SFP) Clusters - (888)"
NatureMappingTypeIDName
MemberOfProhibitedC990SFP Secondary Cluster: Tainted Input to Command
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 990
Name: SFP Secondary Cluster: Tainted Input to Command
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
ConfidentialityIntegrityAvailabilityN/ARead Application DataExecute Unauthorized Code or Commands
N/A
Scope: Confidentiality, Integrity, Availability
Likelihood: N/A
Impact: Read Application Data, Execute Unauthorized Code or Commands
Note:
N/A
▼Potential Mitigations
Phase:Implementation
Mitigation ID: MIT-30.1
Strategy: Output Encoding
Effectiveness:
Description:

Use and specify an output encoding that can be handled by the downstream component that is reading the output. Common encodings include ISO-8859-1, UTF-7, and UTF-8. When an encoding is not specified, a downstream component may choose a different encoding, either by assuming a default encoding or automatically inferring which encoding is being used, which can be erroneous. When the encodings are inconsistent, the downstream component might treat some character or byte sequences as special, even if they are not special in the original encoding. Attackers might then be able to exploit this discrepancy and conduct injection attacks; they even might be able to bypass protection mechanisms that assume the original encoding is also being used by the downstream component.

The problem of inconsistent output encodings often arises in web pages. If an encoding is not specified in an HTTP header, web browsers often guess about which encoding is being used. This can open up the browser to subtle XSS attacks.

Note:


Phase:Implementation
Mitigation ID: MIT-31
Strategy: Attack Surface Reduction
Effectiveness: Defense in Depth
Description:

To help mitigate XSS attacks against the user's session cookie, set the session cookie to be HttpOnly. In browsers that support the HttpOnly feature (such as more recent versions of Internet Explorer and Firefox), this attribute can prevent the user's session cookie from being accessible to malicious client-side scripts that use document.cookie. This is not a complete solution, since HttpOnly is not supported by all browsers. More importantly, XMLHTTPRequest and other powerful browser technologies provide read access to HTTP headers, including the Set-Cookie header in which the HttpOnly flag is set.

Note:

▼Modes Of Introduction
Phase: Implementation
Note:

N/A

▼Applicable Platforms
Languages
Class: Not Language-Specific(Undetermined Prevalence)
▼Demonstrative Examples
▼Observed Examples
ReferenceDescription
CVE-2006-3211
Stored XSS in a guestbook application using a javascript: URI in a bbcode img tag.
CVE-2002-1649
javascript URI scheme in IMG tag.
CVE-2002-1803
javascript URI scheme in IMG tag.
CVE-2002-1804
javascript URI scheme in IMG tag.
CVE-2002-1805
javascript URI scheme in IMG tag.
CVE-2002-1806
javascript URI scheme in IMG tag.
CVE-2002-1807
javascript URI scheme in IMG tag.
CVE-2002-1808
javascript URI scheme in IMG tag.
Reference: CVE-2006-3211
Description:
Stored XSS in a guestbook application using a javascript: URI in a bbcode img tag.
Reference: CVE-2002-1649
Description:
javascript URI scheme in IMG tag.
Reference: CVE-2002-1803
Description:
javascript URI scheme in IMG tag.
Reference: CVE-2002-1804
Description:
javascript URI scheme in IMG tag.
Reference: CVE-2002-1805
Description:
javascript URI scheme in IMG tag.
Reference: CVE-2002-1806
Description:
javascript URI scheme in IMG tag.
Reference: CVE-2002-1807
Description:
javascript URI scheme in IMG tag.
Reference: CVE-2002-1808
Description:
javascript URI scheme in IMG tag.
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      ▼Detection Methods
      ▼Vulnerability Mapping Notes
      Usage:Allowed
      Reason:Acceptable-Use
      Rationale:

      This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.

      Comments:

      Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

      Suggestions:
      ▼Notes
      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      PLOVERN/AN/AScript in IMG tags
      Software Fault PatternsSFP24N/ATainted input to command
      Taxonomy Name: PLOVER
      Entry ID: N/A
      Fit: N/A
      Entry Name: Script in IMG tags
      Taxonomy Name: Software Fault Patterns
      Entry ID: SFP24
      Fit: N/A
      Entry Name: Tainted input to command
      ▼Related Attack Patterns
      IDName
      ▼References
      Details not found