"Many Web applications have a file-sharing feature that allows Web users to share files by
uploading them to, and downloading them from, a Web-accessible file repository. Shared files
may include HTML files and other files containing scripts that are executed by the browser in
the security context of the user that downloads the file. This opens the door to a range of crossuser
attacks, including attacks by former users and even attacks by a user of a virtual application
instance against a different virtual instance of the same application. Such attacks are in essence
XSS attacks, but the usual defenses against XSS are typically not available, because shared files
cannot be sanitized."
The title of this article caught my eye. This article looks at ways to protect your Web applications against attacks through HTML shared files. Read on for more information....
The link for this article located at cgisecurity is no longer available.