A3:2021 | Cross Site Scripting Mitigation (4) | Cycubix Docs
Last updated
Was this helpful?
Last updated
Was this helpful?
Do not be bothered by the incubator status on this project. Use it if you are doing Java web apps and defending against XSS. Use this link:
link:
link:
Good to know your enemy …link
Encoding in the client can be tricky. Here are some resources to help with that. If you do not see your framework below (e.g., Ember, React, ???) and would like to contribute or suggest something stop by and file an issue (preferably with some recommendations/links) or fork and submit a pull request.
jQuery
be aware if you are using something like:
$selector.html(userInputHere),
you are in danger. If you want to use that, ensure you are doing something more like:
$selector.html(someEncodeHtmlMethod(userInputHere))
OR
$selector.text(someEncodeHtmlMethod(userInputHere))
Backbone.js
(One character can make such a difference)
Angular
If you only want the text of what is output by the user ()
Angular has sought to escape by default, but the expression language has proven to have 'sandbox' escapes. Best to check details of the version you are using and consult starting here: