Question: An input validation mechanism designed to block SQL injection and Cross Site scripting attacks performs the following sequence of steps on an item of input:

An input validation mechanism designed to block SQL injection and Cross Site scripting attacks performs the following sequence of steps on an item of input:
1) Strip any apostrophe character
2) Strip the - Character
3) Strip any expressions that appear
4) Remove any quotation marks
5) URL- decode the input
Can you bypass this validation mechanism to smuggle the following data past it? If yes, show the input string you use to smuggle the data into the application.
"">< script > alert (" foo ")</ script >

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!