OWASP Mutillidae II: Web Pwn in Mass Production
Version: 2.6.48 Security Level: 0 (Hosed) Hints: Enabled (1 - 5cr1pt K1dd1e) Not Logged In
Home | Login/Register | Toggle Hints| Show Popup Hints | Toggle Security | Enforce SSL | Reset DB | View Log | View Captured Data
 
Want to Help?
 
 
 
 
Discussion of Back Button
Expand Hints Hints and Videos
Discussion of Back Button
The large back button image appears automatically on most pages in the site. If the image is clicked the user is redirected to the previous page. The button works by executing a javascript statement which sets document.location.href equal to the HTTP header referrer. The HTTP referrer is automatically set and sent by the browser. Some browsers allow the referrer to be set. In all cases, the user can alter the referrer using an interception proxy. A mallicious agent can override the referrer using a machine in the middle attack.
Alter the HTTP referrer to a page other than the one intended such as www.google.com in order to redirect a user to an arbitrary page.

Alter the HTTP referrer to be a valid JavaScript statement in order to execute a XSS attack.

Alter the referrer to break out of the JavaScript context then write HTML to the page to execute and HTML injection attack.