Details
Alert ID 10030
Alert Type Passive
Status release
Risk Informational
CWE 20
WASC 20
Technologies Targeted All
Tags CWE-20
OWASP_2017_A01
OWASP_2021_A03
More Info Scan Rule Help

Summary

This check looks at user-supplied input in query string parameters and POST data to identify where Content-Type or meta tag charset declarations might be user-controlled. Such charset declarations should always be declared by the application. If an attacker can control the response charset, they could manipulate the HTML to perform XSS or other attacks. For example, an attacker controlling the element charset value is able to declare UTF-7 and is also able to include enough user-controlled payload early in the HTML document to have it interpreted as UTF-7. By encoding their payload with UTF-7 the attacker is able to bypass any server-side XSS protections and embed script in the page.

Solution

Force UTF-8 in all charset declarations. If user-input is required to decide a charset declaration, ensure that only an allowed list is used.

Other Info

A(n) [Content-Type HTTP header] tag [charset] attribute The user input found was: cs=utf-8 The charset value it controlled was: utf-8

References

Code

org/zaproxy/zap/extension/pscanrules/UserControlledCharsetScanRule.java