Fork me on GitHub

XSS Vulnerability Scan

Prerequisites

In order to perform an XSS vulnerability scan, x2vc requires a schema file for each XSLT file to be examined. You can read more about the process of creating the schema file here. If you just want to give x2vc a try, it is recommended to download the example files that already come with a schema file. If you built x2vc from source, you will find these examples in your local working copy as well.

x2vc needs write access to the directory the XSLT and schema files reside in to create the report and log files.

Execution

The basic invocation pattern applies. Use the mode xss to limit x2vc to just perform an XSS vulnerability scan without changing the schema file provided.

$ x2vc xss po_*.xslt

This will generate a report file as described here for each XSLT file. The report contains a description of each potential vulnerability identified; more information about the types of vulnerabilites will be added to this documentation later on.