-
Notifications
You must be signed in to change notification settings - Fork 0
/
back-button-discussion.php
executable file
·32 lines (30 loc) · 1.4 KB
/
back-button-discussion.php
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
<div class="page-title">Discussion of Back Button</div>
<?php include_once (__SITE_ROOT__.'/includes/back-button.inc');?>
<?php include_once (__SITE_ROOT__.'/includes/hints/hints-menu-wrapper.inc'); ?>
<table style="margin-left:auto; margin-right:auto; width: 600px;">
<tr>
<td class="form-header">Discussion of Back Button</td>
</tr>
<tr><td></td></tr>
<tr>
<td>The large back button image appears automatically on most pages in the site. If the image is clicked
the user is redirected to the previous page. The button works by executing a javascript statement which
sets document.location.href equal to the HTTP header referrer. The HTTP referrer is automatically
set and sent by the browser. Some browsers allow the referrer to be set. In all cases, the user
can alter the referrer using an interception proxy. A mallicious agent can override the referrer using
a machine in the middle attack.</td>
</tr>
<tr><td></td></tr>
<tr>
<td style="text-align:center;">
Alter the HTTP referrer to a page other than the one intended such as www.google.com in order
to redirect a user to an arbitrary page.
<br><br>
Alter the HTTP referrer to be a valid JavaScript statement in order to execute a XSS attack.
<br><br>
Alter the referrer to break out of the JavaScript context then write HTML to the page to execute
and HTML injection attack.
</td>
</tr>
<tr><td> </td></tr>
</table>