Forgive my ignorance, but isn't this only an issue if you treat jsp  
like php?  If you are using a framework like stripes, you can sanitize  
the input in the controller either with an interceptor or by putting  
sanitization logic in the set method in the action bean.  The default  
namespace in jsp is tied to the page context, the request context, the  
application context and the session context, NOT the parameter  
context.  You must explicilt put ${param.name} to get an input  
parameter.  This would be a big warning flag if found in any app.

Sent from my iPod

On Sep 27, 2009, at 4:08 PM, Dominic Mitchell <[email protected]>  
wrote:

> On Sun, Sep 27, 2009 at 8:53 PM, Alex Turner <[email protected]> wrote:
> JSP may not be the slickest templating system, but it's easy and  
> gets the job done.
>
> The problem I always found with JSP was that there was no way to get  
> it to escape HTML by default (unless I tell it otherwise).  This  
> means I have to say <c:out value="foo" /> for every single  
> variable.  If I forget ― boom, instant cross-site-scripting hole.
>
> It's quite likely that I've simply missed some configuration  
> setting, but I didn't see it when I hunted for it.
>
> In the Perl world, I used HTML::Mason, which worked well and offered  
> this feature.
>
> -Dom
>
> >

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "The 
Java Posse" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/javaposse?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to