Uncovering HTML Injection Vulnerabilities in Web Applications: A Comprehensive Analysis
jadavvineet73
181 views
32 slides
Jul 02, 2024
Slide 1 of 32
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
About This Presentation
This presentation provides an in-depth analysis of HTML injection vulnerabilities in web applications. It explores the mechanisms through which these vulnerabilities are introduced, their potential impacts, and effective mitigation strategies. Through case studies and real-world examples, the report...
This presentation provides an in-depth analysis of HTML injection vulnerabilities in web applications. It explores the mechanisms through which these vulnerabilities are introduced, their potential impacts, and effective mitigation strategies. Through case studies and real-world examples, the report highlights the importance of secure coding practices and regular vulnerability assessments to safeguard web applications from malicious exploits.
for more details visit : https://bostoninstituteofanalytics.org/cyber-security-and-ethical-hacking/
Size: 11.44 MB
Language: en
Added: Jul 02, 2024
Slides: 32 pages
Slide Content
Project Report on Uncovering HTML Injection Vulnerabilities in Web Applications
Agenda Research Data Collection Impact Analysis Recommendation Abstract Tools Proof of Concept (PoC) References
Data Collection: Technology Stack: Frontend: HTML, CSS, JavaScript Backend: PHP Database: MySQL Web Server: Apache
Impact Analysis: HTML Injection vulnerabilities can have significant impacts, including: Defacement: Attackers can modify the appearance of the website. Phishing: Injected HTML can create fake login forms to steal user credentials. Malicious Redirection: Users can be redirected to malicious sites. Cookie Theft: JavaScript injection can steal cookies, leading to session hijacking.
Recommendation : To mitigate HTML Injection vulnerabilities, the following security measures should be implemented: Input Validation: Validate and sanitize all user inputs on the server-side to ensure they do not contain any HTML tags or scripts. Output Encoding: Encode data before displaying it on the web page to prevent the browser from interpreting it as HTML or JavaScript. Content Security Policy (CSP): Implement a CSP to restrict the sources from which scripts and other resources can be loaded. Regular Security Audits: Perform regular security audits and vulnerability assessments to identify and fix potential security issues. Use Security Libraries: Utilize security libraries and frameworks that offer built-in protection against common web vulnerabilities.
Abstract: The goal of this report is to identify and demonstrate the presence of an HTML Injection vulnerability on a specific website. HTML Injection occurs when an attacker can inject arbitrary HTML code into a web page due to improper input validation. This report includes a detailed analysis of the vulnerability, its impact, and recommendations for mitigating such security issues. Additionally, a Proof of Concept (PoC) is provided to demonstrate the exploit.
Tools: Browser: Has used for manual testing Burp Suite: has used for intercepting and modifying requests Temp-mail: has used for generating temporary mails.
Proof of Concept (PoC): Capture Packets with BurpSuite : open BurpSuite and set up the proxy.
Configure the browser to use BurpSuite’s proxy.
Navigate to the vulnerable website https://www.manageengine.com .
Go to support in that request a demo.
Now start the burp proxy to capture the http request from the website.
Turn on the intercept on the burp suite.
Get the temporary mail from https://temp-mail.org .
Fill all the required information in the given form and click on submit.
Go to the burp suite and search for the username in the captured request.
Copy this html line of code and paste it into the http request in burp suite.
Paste it in between the <h1></h1> in the username and replace “test.com” to “evil.com” send the request.
Turn off the interception in the burp suite.
Turn off the burp proxy.
Reload the vulnerable website page.
Go to the temp mail website and search for the inbox mail.
Open the mail which we received from vulnerable website.
Click on the given link address in the mail.
And it redirected to the “evil.com”.
References: OWASP HTML Injection HTML Injection Example
Conclusion The project successfully identified an HTML Injection vulnerability on the target website. The provided PoC demonstrates the exploit, and appropriate recommendations have been made to mitigate such vulnerabilities in the future. Proper input validation, output encoding, and security policies are crucial in protecting against HTML Injection attacks.