Detection of DOM-based cross-site scripting vulnerabilities
First Claim
Patent Images
1. A method of testing a Web-based application for security vulnerabilities, the method comprising:
- communicating at least one client request comprising a payload having a unique identifier to the Web-based application;
responsive to communicating the at least one client request comprising the payload having the unique identifier to the Web-based application, receiving from the Web-based application response hypertext markup language (HTML) and an associated Document Object Model (DOM) object, the DOM object including the unique identifier communicated to the web-based application in the payload;
via a processor, identifying in the DOM object the unique identifier communicated to the web-based application in the payload; and
responsive to identifying in the received DOM object the unique identifier communicated to the web-based application in the payload, identifying as un-trusted a section of the received DOM object comprising content corresponding to the payload, which is identified in the received DOM object via the unique identifier.
0 Assignments
0 Petitions
Accused Products
Abstract
Testing a Web-based application for security vulnerabilities. At least one client request including a payload having a unique identifier can be communicated to the Web-based application. Response HTML and an associated Document Object Model (DOM) object can be received from the Web-based application. Content corresponding to the payload can be identified in the DOM object via the unique identifier. A section of the DOM object including the payload can be identified as un-trusted.
16 Citations
12 Claims
-
1. A method of testing a Web-based application for security vulnerabilities, the method comprising:
-
communicating at least one client request comprising a payload having a unique identifier to the Web-based application; responsive to communicating the at least one client request comprising the payload having the unique identifier to the Web-based application, receiving from the Web-based application response hypertext markup language (HTML) and an associated Document Object Model (DOM) object, the DOM object including the unique identifier communicated to the web-based application in the payload; via a processor, identifying in the DOM object the unique identifier communicated to the web-based application in the payload; and responsive to identifying in the received DOM object the unique identifier communicated to the web-based application in the payload, identifying as un-trusted a section of the received DOM object comprising content corresponding to the payload, which is identified in the received DOM object via the unique identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of testing a Web-based application for security vulnerabilities, the method comprising:
-
communicating at least one client request comprising a payload having a unique identifier to the Web-based application; responsive to communicating the at least one client request comprising the payload having the unique identifier to the Web-based application, receiving from the Web-based application response hypertext markup language (HTML) and an associated Document Object Model (DOM) object, the DOM object including the unique identifier communicated to the web-based application in the payload; via a processor, identifying content corresponding to the payload in the DOM object via the unique identifier; generating a DOM abstraction from the DOM object, the DOM abstraction comprising a section of the DOM object containing content corresponding to the payload, and excluding from the DOM abstraction sections of the DOM object not comprising content corresponding to the payload; rendering the response HTML using the DOM abstraction in lieu of the DOM object; when rendering the response HTML, performing a static security analysis on the response HTML to monitor script code associated with the HTML that is executed in order to identify whether at least one access to the DOM abstraction retrieves the content corresponding to the payload; and when the access to the DOM abstraction retrieves the content corresponding to the payload, generating a flag indicating that a vulnerability exists within the Web-based application. - View Dependent Claims (9, 10, 11)
-
-
12. A method of testing a Web-based application for security vulnerabilities, the method comprising:
-
communicating at least one client request comprising a script code having a unique identifier to a Web-based application; responsive to communicating the at least one client request comprising the payload having the unique identifier to the Web-based application, receiving from the Web-based application response hypertext markup language (HTML) and an associated Document Object Model (DOM) object, the received DOM object including the unique identifier communicated to the Web-based application in the script code; via a processor, identifying in the DOM object the unique identifier communicated to the Web-based application in the script code; and responsive to identifying in the received DOM object the unique identifier communicated to the web-based application in the script code, identifying as un-trusted a section of the received DOM object comprising content corresponding to the script code, which is identified in the received DOM object via the unique identifier.
-
Specification