Shouldn’t I follow the OWASP DOM based XSS recommendations no matter where the payload is injected?

I heard/read at various contexts that DOM based XSS is caused by untrusted client side input and developers need to follow instructions at the OWASP “DOM based XSS Prevention Cheat Sheet” in order to mitigate it.

My questio… Continue reading Shouldn’t I follow the OWASP DOM based XSS recommendations no matter where the payload is injected?

Can the difference between reflected XSS and dom XSS be explained using real world examples?

Can the difference between reflected XSS and DOM XSS be explained using real world examples?

For example, how is it possible to exploit or grab a remote victim’s cookies or session related information?

From I understand with reflected XSS, JavaScript injection is used.

For example:

 <script src="https://serveraddress/">filenae.js</script>

Is the same methodology used to exploit DOM based XSS?

Continue reading Can the difference between reflected XSS and dom XSS be explained using real world examples?