He guys
I just read this post about a really different (and at the same time cool) way to execute XSS. However, it is still not clear to me.
I understand the full concept of an attack, but I don’t see how this could potentially be used. The action attribute inside the form should point to the ftp server (or any other server that reflects input), but this never happens.
Therefore, if you do not have another XSS hole for entering this form, this vulnerability cannot be exploited. My question is that my conclusion that it cannot be used is true or is something missing something?
Henri source
share