Skip to main content
Solved

Question of the day 12/09, Cybersecurity Edition


marcofabbri
Forum|alt.badge.img+13

Day 10

You are moderator of a Wordpress site. It’s monday morning and you had already a cup of coffee. While checking comments on site posted in the previous weekend, you found a plaintext transformed code.

<img src=x onerror="alert(1)" />

What type of attack was tried to check?

  • Path traversal
  • Banner grabbing
  • Subdomain scanning
  • Cross-site scripting
  • SOAP api

Best answer by mkevenaar

Cross site scripting 

View original
Did this topic help you find an answer to your question?

7 comments

mkevenaar
Forum|alt.badge.img+15
  • Veeam Vanguard
  • 149 comments
  • Answer
  • September 12, 2022

Cross site scripting 


dips
Forum|alt.badge.img+7
  • Veeam Legend
  • 808 comments
  • September 12, 2022

Cross-site scripting


JMeixner
Forum|alt.badge.img+17
  • On the path to Greatness
  • 2650 comments
  • September 12, 2022

Cross-site scripting  😎


Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8512 comments
  • September 12, 2022

Cross-site scripting


wolff.mateus
Forum|alt.badge.img+11
  • Veeam Vanguard
  • 542 comments
  • September 12, 2022

It sounds like CSS (Cross-site scripting) attack.


marcofabbri
Forum|alt.badge.img+13
  • Author
  • On the path to Greatness
  • 990 comments
  • September 13, 2022

XSS was the correct answer: XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users (stored xss) or by attacker itself (reflecterd XSS)


mkevenaar
Forum|alt.badge.img+15
  • Veeam Vanguard
  • 149 comments
  • September 21, 2022

I just found a real life example on this community:

 


I already reported this user to @Madi.Cristil 


Comment