T 5.173 Integration of third party data and malicious code in web applications

If the input and output data of a web application is validated insufficiently, an attacker may integrate content such as malicious code for manipulating the web application of the client (e.g. web browser). The integrated data is presented to the user within the security context of the web application. Accordingly, the user of the web application cannot or only to a limited extent identify the manipulated parts of the web application. This way, the attacker can exploit the position of trust of the authenticated user regarding the web application.

Both the clients and the servers of the web application may be subject to an attack by the integrated malicious code. For example, data embedded by an attacker may contain malicious code to be executed on the clients (e.g. for reading confidential data) or forged login forms designed to steal access data. If the integrated program code is executed in the web application, the operating system underlying the web application may also be compromised.

Examples: