Skip to content

Commit efd7f1a

Browse files
committed
Create 5.3.3.2.yaml
1 parent 53bb62b commit efd7f1a

File tree

1 file changed

+56
-0
lines changed

1 file changed

+56
-0
lines changed

templates/dast/5.3.3.2.yaml

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
id: ASVS-4-0-3-V5-3-3-2
2+
3+
info:
4+
name: ASVS 5.3.3.2 (Reflected XSS) Check
5+
author: AmirHossein Raeisi
6+
severity: medium
7+
classification:
8+
cwe-id: CWE-79
9+
reference:
10+
- https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/01-Testing_for_Reflected_Cross_Site_Scripting
11+
- https://snbig.github.io/Vulnerable-Pages/ASVS_5_3_3/
12+
- https://github.com/projectdiscovery/nuclei-templates/blob/main/dast/vulnerabilities/xss/reflected-xss.yaml
13+
tags: asvs,5.3.3
14+
description: |
15+
Verify that context-aware, preferably automated - or at worst, manual - output escaping protects against reflected, stored, and DOM based XSS. ([C4](https://owasp.org/www-project-proactive-controls/#div-numbering))
16+
17+
variables:
18+
first: "{{rand_int(10000, 99999)}}"
19+
20+
http:
21+
- pre-condition:
22+
- type: dsl
23+
dsl:
24+
- 'method == "GET"'
25+
26+
payloads:
27+
reflection:
28+
- "'\"><{{first}}>"
29+
- "'><{{first}}>"
30+
- "\"><{{first}}>"
31+
32+
fuzzing:
33+
- part: query
34+
type: postfix
35+
mode: single
36+
fuzz:
37+
- "{{reflection}}"
38+
39+
- part: path
40+
type: postfix
41+
mode: single
42+
fuzz:
43+
- "{{reflection}}"
44+
45+
stop-at-first-match: true
46+
matchers-condition: and
47+
matchers:
48+
- type: word
49+
part: body
50+
words:
51+
- "{{reflection}}"
52+
53+
- type: word
54+
part: header
55+
words:
56+
- "text/html"

0 commit comments

Comments
 (0)