Advanced Search
MyIDEAS: Login to save this paper or follow this series

Automatic and Context-Aware Cross-Site Scripting Filter Evasion


Author Info

  • Fabrizio d’Amore

    (Department of Computer, Control and Management Engineering, Universita' degli Studi di Roma "La Sapienza")

  • Mauro Gentile

    (Department of Computer, Control and Management Engineering, Universita' degli Studi di Roma "La Sapienza")

Registered author(s):


    Cross-Site Scripting (XSS) is a pervasive vulnerability that involves a huge portion of modern web applications. Implementing a correct and complete XSS filter for user-generated content can really be a challenge for web developers. Many aspects have to be taken into account sincethe attackers may continuously show off a potentially unlimited armory. This work proposes an approach and a tool – named snuck – for web application penetration testing, which can definitely help in finding hard-to-spot and advanced XSS vulnerabilities. This methodology is based on the inspection of the inject ion’s reflection context and relies on a set of specialized and obfuscated attack vectors for bypassing filter based protections, adopted against potentially harmful inputs. In addition, XSS testing is performed in-browser, this means that a web browser is driven in reproducing the attacker and possibly the victim behavior. Results of several tests on many popular Content Management Systems proved the benefits of this approach: no other web vulnerability scanner would have been able to discover some advanced ways to bypass robust XSS filters.

    Download Info

    If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
    File URL:
    File Function: First version, 2012
    Download Restriction: no

    Bibliographic Info

    Paper provided by Department of Computer, Control and Management Engineering, Universita' degli Studi di Roma "La Sapienza" in its series DIAG Technical Reports with number 2012-04.

    as in new window
    Length: 58 pages
    Date of creation: Apr 2012
    Date of revision:
    Handle: RePEc:aeg:report:2012-04

    Contact details of provider:
    Phone: +390677274140
    Fax: +39 0677274129
    Web page:
    More information through EDIRC

    Related research

    Keywords: Computer security; Network Security; Web Application Security; Browser Security; Vulnerability Detection; Cross-site Scripting; XSS;

    This paper has been announced in the following NEP Reports:


    No references listed on IDEAS
    You can help add them by filling out this form.



    This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.


    Access and download statistics


    When requesting a correction, please mention this item's handle: RePEc:aeg:report:2012-04. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Antonietta Angelica Zucconi).

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If references are entirely missing, you can add them using this form.

    If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.