The following are common XSS vulnerabilities found in iFrame busters.
- Unescaped URL parameter values
- Parameters that accept any domain
Special characters should be removed or converted into their equivalent HTML/hex entity. The characters in the following table can be used to write malicious code on the page.
example.com/iframebuster.html?parameter="></script><script>alert('XSS')</script>
| Character | HTML Entity |
|---|---|
& |
& |
< |
< |
> |
> |
" |
" |
' |
' |
/ |
/ |
When passing a domain as a parameter to write a script tag onto the page, it should be restricted to an approved domain(s).
example.com/iframebuster.html?server=evildomain.com
Further guidelines can be found at ha.ckers.org/xss.html, which covers the above rules as well as many others.