Hi folks,

We've implemented the portcullis xss filter with success but we are coming
across some false positives that I wanted to run by the big brains on this
list.

One example is the word "exec" as in "marketing exec" which is getting
filtered when it shouldn't be. 

The developer on our end in this case has noted that:
-----------------------------------------------------
"It currently detects "exec" or "execute" followed by a space character or
URL encoded space character (%20).  To reduce false positives, we will need
to get a list of dangerous system stored procedures to use in the regular
expression."
-----------------------------------------------------

I'm hoping that this kind of problem has already been solved and we don't
have to re-create the wheel.

Thoughts?

As always, thank you in advance for your help.

Nick





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:341011
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm

Reply via email to