Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-80 (Web页面中脚本相关HTML标签转义处理不恰当(基本跨站脚本)) — Vulnerability Class 403

403 vulnerabilities classified as CWE-80 (Web页面中脚本相关HTML标签转义处理不恰当(基本跨站脚本)). AI Chinese analysis included.

CWE-80 represents a critical input validation weakness where applications fail to properly sanitize user-supplied data before rendering it in web pages. This flaw allows attackers to inject malicious scripts, typically JavaScript, into the HTML content viewed by other users. Exploitation usually occurs when an attacker crafts a malicious URL or form input containing script tags, which the vulnerable application then executes in the victim’s browser without proper filtering. This can lead to severe consequences such as session hijacking, credential theft, or defacement. To mitigate this risk, developers must implement robust output encoding strategies, ensuring that all special characters like angle brackets and ampersands are converted into their safe HTML entity equivalents. Additionally, employing Content Security Policy headers and utilizing modern frameworks with built-in escaping mechanisms further reduces the attack surface by preventing the execution of unauthorized scripts.

MITRE CWE Description
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
Common Consequences (1)
Confidentiality, Integrity, AvailabilityRead Application Data, Execute Unauthorized Code or Commands
An attacker could insert special characters that are processed client-side in the context of the user's session.
Mitigations (4)
ImplementationCarefully check each input parameter against a rigorous positive specification (allowlist) defining the specific characters and format allowed. All input should be neutralized, not just parameters that the user is supposed to specify, but all data in the request, including hidden fields, cookies, headers, the URL itself, and so forth. A common mistake that leads to continuing XSS vulnerabilities i…
ImplementationUse and specify an output encoding that can be handled by the downstream component that is reading the output. Common encodings include ISO-8859-1, UTF-7, and UTF-8. When an encoding is not specified, a downstream component may choose a different encoding, either by assuming a default encoding or automatically inferring which encoding is being used, which can be erroneous. When the encodings are i…
ImplementationWith Struts, write all data from form beans with the bean's filter attribute set to true.
ImplementationTo help mitigate XSS attacks against the user's session cookie, set the session cookie to be HttpOnly. In browsers that support the HttpOnly feature (such as more recent versions of Internet Explorer and Firefox), this attribute can prevent the user's session cookie from being accessible to malicious client-side scripts that use document.cookie. This is not a complete solution, since HttpOnly is n…
Effectiveness: Defense in Depth
Examples (1)
In the following example, a guestbook comment isn't properly encoded, filtered, or otherwise neutralized for script-related tags before being displayed in a client browser.
<% for (Iterator i = guestbook.iterator(); i.hasNext(); ) { Entry e = (Entry) i.next(); %> <p>Entry #<%= e.getId() %></p> <p><%= e.getText() %></p> <% } %>
Bad · JSP
CVE IDTitleCVSSSeverityPublished
CVE-2019-13931 Siemens XHQ Operations Intelligence 跨站脚本漏洞 — XHQ 5.4 -2019-12-12
CVE-2019-13923 Siemens IE-WSN-PA Link WirelessHART Gateway 跨站脚本漏洞 — IE/WSN-PA Link WirelessHART Gateway 6.1 -2019-09-13
CVE-2019-5450 Nextcloud Android app 跨站脚本漏洞 — com.nextcloud.client 4.3 -2019-07-30
CVE-2019-1010018 Zammad 跨站脚本漏洞 — Zammad 6.1 -2019-07-16
CVE-2019-10933 Siemens Spectrum Power 跨站脚本漏洞 — Spectrum Power 3 (Corporate User Interface) 6.1 -2019-07-11
CVE-2019-6577 多款Siemens产品跨站脚本漏洞 — SIMATIC HMI Comfort Panels 4" - 22" 7.5 -2019-05-14
CVE-2018-16555 多款Siemens产品跨站脚本漏洞 — SCALANCE S602, SCALANCE S612, SCALANCE S623, SCALANCE S627-2M 5.4 -2018-12-13
CVE-2016-9493 PHP forms generated using the PHP FormMail Generator are vulnerable to stored cross-site scripting — Generator 6.1 -2018-07-13
CVE-2016-9500 The Accellion FTP server prior to version FTA_9_12_220 is vulnerable to informaiton exposure — FTP Server 6.1 -2018-07-13
CVE-2018-4848 Siemens SCALANCE X-200 IRT 跨站脚本漏洞 — SCALANCE X-200 switch family (incl. SIPLUS NET variants) 9.1 -2018-06-14
CVE-2017-16015 Forms 跨站脚本漏洞 — forms node module 6.1 -2018-06-04
CVE-2017-16043 Shout 安全漏洞 — shout node module 6.1 -2018-06-04
CVE-2014-2353 Cogent DataHub XSS — DataHub 6.1 -2014-05-30

Vulnerabilities classified as CWE-80 (Web页面中脚本相关HTML标签转义处理不恰当(基本跨站脚本)) represent 403 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.