Thanks for all the responses. By default encoding, do you mean encoding="none"?
Thanks Steve -----Original Message----- From: William M. Conlon [mailto:[EMAIL PROTECTED] Sent: Friday, April 27, 2007 3:43 PM To: [email protected] Subject: Re: Witango-Talk: Cross Site Scripting Vulnerability Agreed. this is one nice aspect of Witango -- the default encoding can thwart XSS. And the automatic databinding can thwart SQL injection! -- Bill ---------- Original Message ----------- From: Jason Pamental <[EMAIL PROTECTED]> To: [email protected] Sent: Fri, 27 Apr 2007 15:05:43 -0400 Subject: Re: Witango-Talk: Cross Site Scripting Vulnerability > Steve, > > This sort of attack depends solely on what you are taking in being > displayed on screen. So while there is obviously a need for basic > validation on whatever you are taking in, it's not necessary to > defend against these sorts of attacks. I've been thinking about it > quite a bit lately and was thinking about some sort of custom tag > that would simply remove any sort of strings that evaluate to > '<script>' (or <script ...>) with nothing. Once you do that, none of > the code will work, and you only need to do it on 'confirm' sorts > of pages for form submission, or use it on insertion into a > database for any bits that are going to be displayed on a page > (body copy for a dynamic web page, etc). > > So something like <@customXSStagname value="<@arg youwanttoclean>"> > would in turn use a series of '<@replaces>' or something like that > to clean the string you're passing into it and then evaluates to > displaying that result. If we created the tag, TCF and maybe an > external file we can easily modify with new strings to check for as > time goes on it could be a really valuable tool for the whole > community. I'd certainly be willing to help out with it - I've found > an interesting page hosted by (I think) some hackers detailing just > how to go about conducting these attacks, so by reverse engineering > what they're suggesting it would be a great start to dealing with > the threat. > > Regards, > > Jason > > ps - there was a really good couple of podcasts about this on > Security Now - very worth listening to: > http://www.grc.com/securitynow ) > > ----- > > Jason Pamental > Director of Web Services > North Sails > > Office: 401.643.1415 > Fax: 401.643.1420 > Mobile: 401.743.4406 > Email: [EMAIL PROTECTED] > > On Apr 27, 2007, at 2:45 PM, Fogelson, Steve wrote: > > > Hi, > > > > After doing additional research it appears I need to check all > > incoming > > arguments whether hidden or contained in the url. I thought I would > > do the > > following > > > > 1) Find all the arguments with <@ASSIGN request$mySEARCHargs > > VALUE="<@SEARCHARGNAMES>"> > > > > 2) Change the args to request scoped vars > > > > 3) Sanitize them by removing these characters & ' " > < ( ) > > [ ] ; : / { } ! > > -- = _ > > > > I was also thinking about pre-pending argument names for forms with a > > character to define that this arg is a number, alpha/numeric, > > telephone > > number, etc. and then validate the field accordingly as well. > > > > All of this would be done server side in my housekeeping tcf. > > > > I would appreciate if anyone could tell me if I am on the right > > path and > > post any suggestions as well. > > > > Thanks > > > > Steve Fogelson > > > > -----Original Message----- > > From: Fogelson, Steve [mailto:[EMAIL PROTECTED] > > Sent: Thursday, April 26, 2007 9:48 PM > > To: [email protected] > > Subject: Witango-Talk: Cross Site Scripting Vunerability > > > > Hi, > > > > I just signed up with HackerSafe to scan one of my sites. Well I > > have Cross > > Site Scripting Vunerability on some of my pages. IE: Login, adding > > a new > > customer, adding billing and shipping info, etc. Any page that has > > a form on > > it. > > > > I have researched the Witango forum and didn't find anything, but I > > might > > have used the incorrect search criteria. It appears that the > > solutions are > > the following: > > 1) Don't allow any html tags > > 2) Don't allow any quotes > > 3) Don't allow any parenthesis > > So it looks like I need to filter each field (argument) for the > > above and > > remove it. > > > > I would appreciate any info, filters, etc that anyone could provide. > > > > Thanks in advance. > > > > Steve Fogelson > > Internet Commerce Solutions > > ______________________________________________________________________ > > __ > > TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf > > ______________________________________________________________________ > > __ > > TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf > > > > > > Visit us at http://www.northsails.com > > > > [This E-mail scanned for viruses by Declude Virus] > > ________________________________________________________________________ > TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf ------- End of Original Message ------- ________________________________________________________________________ TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf ________________________________________________________________________ TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf
