Yes.

--
Bill



---------- Original Message -----------
From: "Fogelson, Steve" <[EMAIL PROTECTED]>
To: [email protected]
Sent: Fri, 27 Apr 2007 15:45:14 -0500
Subject: RE: Witango-Talk: Cross Site Scripting Vulnerability

> Thanks for all the responses. By default encoding, do you mean
> encoding="none"?
> 
> Thanks
> 
> Steve
> 
> -----Original Message-----
> From: William M. Conlon [mailto:[EMAIL PROTECTED] 
> Sent: Friday, April 27, 2007 3:43 PM
> To: [email protected]
> Subject: Re: Witango-Talk: Cross Site Scripting Vulnerability
> 
> Agreed.  this is one nice aspect of Witango -- the default encoding can
> thwart XSS.  And the 
> automatic databinding can thwart SQL injection!
> 
> --
> Bill
> 
> ---------- Original Message -----------
> From: Jason Pamental <[EMAIL PROTECTED]>
> To: [email protected]
> Sent: Fri, 27 Apr 2007 15:05:43 -0400
> Subject: Re: Witango-Talk: Cross Site Scripting Vulnerability
> 
> > Steve,
> > 
> > This sort of attack depends solely on what you are taking in being  
> > displayed on screen. So while there is obviously a need for basic  
> > validation on whatever you are taking in, it's not necessary to  
> > defend against these sorts of attacks. I've been thinking about it  
> > quite a bit lately and was thinking about some sort of custom tag  
> > that would simply remove any sort of strings that evaluate to  
> > '<script>' (or <script ...>) with nothing. Once you do that, none of 
> >  the code will work, and you only need to do it on 'confirm' sorts 
> > of  pages for form submission, or use it on insertion into a 
> > database for  any bits that are going to be displayed on a page 
> > (body copy for a  dynamic web page, etc).
> > 
> > So something like <@customXSStagname value="<@arg youwanttoclean>">  
> > would in turn use a series of '<@replaces>' or something like that 
> > to  clean the string you're passing into it and then evaluates to  
> > displaying that result. If we created the tag, TCF and maybe an  
> > external file we can easily modify with new strings to check for as  
> > time goes on it could be a really valuable tool for the whole  
> > community. I'd certainly be willing to help out with it - I've found 
> >  an interesting page hosted by (I think) some hackers detailing just 
> >  how to go about conducting these attacks, so by reverse engineering 
> >  what they're suggesting it would be a great start to dealing with 
> > the  threat.
> > 
> > Regards,
> > 
> > Jason
> > 
> > ps - there was a really good couple of podcasts about this on  
> > Security Now - very worth listening to: 
> > http://www.grc.com/securitynow )
> > 
> > -----
> > 
> > Jason Pamental
> > Director of Web Services
> > North Sails
> > 
> > Office: 401.643.1415
> > Fax: 401.643.1420
> > Mobile: 401.743.4406
> > Email: [EMAIL PROTECTED]
> > 
> > On Apr 27, 2007, at 2:45 PM, Fogelson, Steve wrote:
> > 
> > > Hi,
> > >
> > > After doing additional research it appears I need to check all  
> > > incoming
> > > arguments whether hidden or contained in the url. I thought I would  
> > > do the
> > > following
> > >
> > > 1) Find all the arguments with <@ASSIGN request$mySEARCHargs
> > > VALUE="<@SEARCHARGNAMES>">
> > >
> > > 2) Change the args to request scoped vars
> > >
> > > 3) Sanitize them by removing these characters & ' " > < ( )  
> > > [ ] ; : / { } !
> > > -- = _ 
> > >
> > > I was also thinking about pre-pending argument names for forms with a
> > > character to define that this arg is a number, alpha/numeric,  
> > > telephone
> > > number, etc. and then validate the field accordingly as well.
> > >
> > > All of this would be done server side in my housekeeping tcf.
> > >
> > > I would appreciate if anyone could tell me if I am on the right  
> > > path and
> > > post any suggestions as well.
> > >
> > > Thanks
> > >
> > > Steve Fogelson
> > >
> > > -----Original Message-----
> > > From: Fogelson, Steve [mailto:[EMAIL PROTECTED]
> > > Sent: Thursday, April 26, 2007 9:48 PM
> > > To: [email protected]
> > > Subject: Witango-Talk: Cross Site Scripting Vunerability
> > >
> > > Hi,
> > >
> > > I just signed up with HackerSafe to scan one of my sites. Well I  
> > > have Cross
> > > Site Scripting Vunerability on some of my pages. IE: Login, adding  
> > > a new
> > > customer, adding billing and shipping info, etc. Any page that has  
> > > a form on
> > > it.
> > >
> > > I have researched the Witango forum and didn't find anything, but I  
> > > might
> > > have used the incorrect search criteria. It appears that the  
> > > solutions are
> > > the following:
> > > 1) Don't allow any html tags
> > > 2) Don't allow any quotes
> > > 3) Don't allow any parenthesis
> > > So it looks like I need to filter each field (argument) for the  
> > > above and
> > > remove it.
> > >
> > > I would appreciate any info, filters, etc that anyone could provide.
> > >
> > > Thanks in advance.
> > >
> > > Steve Fogelson
> > > Internet Commerce Solutions
> > > ______________________________________________________________________ 
> > > __
> > > TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf
> > > ______________________________________________________________________ 
> > > __
> > > TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf
> > >
> > >
> > > Visit us at http://www.northsails.com
> > >
> > > [This E-mail scanned for viruses by Declude Virus]
> > 
> > ________________________________________________________________________
> > TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf
> ------- End of Original Message -------
> ________________________________________________________________________
> TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf
> ________________________________________________________________________
> TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf
------- End of Original Message -------
________________________________________________________________________
TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf

Reply via email to