我'm making a CTF, which is a competition where you have to get a flag using certain methods. I'正在研究一个问题,他们通过使用XSS提醒javascript变量来获取标志 . 但是,XSS并不安全,我不能让他们这么做 . My question is: Is it possible to defend against bad attacks but allow some attacks so that my CTF problem is successful. 我想留下的一些输入就像 alert(flag)

我的HTML代码是:

<!DOCTYPE html>
<html>
    <head>
        <meta charset="utf-8">
        <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">

        <link rel="stylesheet" href="https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/css/bootstrap.min.css" integrity="sha384-MCw98/SFnGE8fJT3GXwEOngsV7Zt27NXFoaoApmYm81iuXoPkFOJwJ8ERdknLPMO"
            crossorigin="anonymous">
        <!--<link rel="stylesheet" href="css/challenge.css">-->
    </head>

    <body>
        <input type="text" id="text"/>
        <button class="btn btn-primary submitButton"></button>
        <p id="result">Result</p>
        <script>
            var flag;
            $.get("[website]/cgi-bin/challenge.py", function(data) {
                flag = data;
            });

            var value;
            $(".submitButton").on("click", function() {
                value = $("#text").val();
                $("#result").html(value);
            });
        </script>
        <script src="http://code.jquery.com/jquery-3.3.1.min.js" integrity="sha256-FgpCb/KJQlLNfOu91ta32o/NMZxltwRo8QtmkMRdAu8="
            crossorigin="anonymous"></script>
        <script src="https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.3/umd/popper.min.js" integrity="sha384-ZMP7rVo3mIykV+2+9J3UJ46jBk0WLaUAdn689aCwoqbBJiSnjAK/l8WvCWPIPm49"
            crossorigin="anonymous"></script>
        <script src="https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js" integrity="sha384-ChfqqxuZUCnJSK3+MXmPNIyE6ZbWh2IMqE241rYiqJxyMiZ6OW/JmZQ5stwEULTy"
            crossorigin="anonymous"></script>
    </body>
</html>

$.get() 只是从python文件中获取类似 "text" 的字符串,并将其存储在变量标志中 . 我用[网站]取代了实际的网站 . 如果有必要,我可以把网站放回去 .