Ang patakaran ng aktibong pag-scan para sa pagtuklas ng mga kahinaan ng DOM XSS.
It launches browser windows and sends attack payloads to all of the relevant DOM elements.
As it launches browser windows it will take significantly longer than other (non browser based) rules.
This version supports Firefox (the default) and Chrome. They can be run with GUI or headless (default), it can be changed with
the rule rules.domxss.browserid, via the Options 'Rule configuration' panel, with values
firefox, firefox-headless, chrome and chrome-headless.
http://example.com/index.html?foo=bar#injection):
Ang patakaran ay magtatala lamang ng isang kahinaan ng DOM XSS kada noda, maliban kung ang LOW Alert threshold ay ginamit, kung saan susubukan nito ang lahat ng tinukoy na mga kargamento.
Latest code: DomXssScanRule.java