<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Weswest</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Weswest"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Weswest"/>
		<updated>2026-05-22T22:14:16Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Stinger_Project&amp;diff=59233</id>
		<title>Category:OWASP Stinger Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Stinger_Project&amp;diff=59233"/>
				<updated>2009-04-20T14:38:54Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: /* Stinger News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
&lt;br /&gt;
Developers consistently implement sporadic, ad-hoc input validation mechanisms for web applications. Lack of a centralized and well-defined input validation mechanism opens the application to a variety of attacks: including SQL Injection, Cross Site Scripting (XSS), and Command Injection. The OWASP Stinger Project aims to develop a centralized input validation component which can be easily applied to existing or developmental applications. Using a declarative security model, Stinger has the ability to validate all HTTP requests coming into an application. Stinger is such a simplistic yet strong validation engine that organizations have begun integrating it into their software development life-cycle.&lt;br /&gt;
&lt;br /&gt;
==Project Lead==&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project is looking for a new leader! If you are interested, please contact [mailto:Wesley.M.West@ge.com Wesley West].&lt;br /&gt;
&lt;br /&gt;
==License==&lt;br /&gt;
&lt;br /&gt;
Stinger is offered under the [http://www.gnu.org/copyleft/lesser.html LGPL]. For further information on OWASP licenses, please consult the [[OWASP Licenses]] page.&lt;br /&gt;
&lt;br /&gt;
==Versions==&lt;br /&gt;
&lt;br /&gt;
:*[[OWASP Stinger Version 2|Click here]] to view the OWASP Stinger 2.x Project page&lt;br /&gt;
:*'''''Deprecated''''' [[OWASP Stinger Version 1|Click here]] to view the OWASP Stinger 1.x Project page&lt;br /&gt;
:*'''''Defunct''''' [[OWASP Stinger Version 3|Click here]] to view the OWASP Stinger 3.x Project page&lt;br /&gt;
&lt;br /&gt;
==Stinger News==&lt;br /&gt;
&lt;br /&gt;
 '''Latest version available! - 25 March 2009 '''&lt;br /&gt;
&lt;br /&gt;
Well, I have updated the site with version 2.2.2 of Stinger for JDK 1.4. There have been some questions about why I have updated from version 2.2, rather than 2.5.  This is because I have only been working with the version supporting JDK 1.4, as that's what my environments are.  This version includes the fix to the MutableHTTPRequest to support multiple parameter values, as well as the fix to address the multipart vulnerability as included in 2.5.&lt;br /&gt;
&lt;br /&gt;
I am trying to get the request object changes made to the later code to allow for a 2.6 release.  But my schedule isn't allowing me much time to work on Stinger lately.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Major Flaw: New versions coming soon! - 26 August 2008 '''&lt;br /&gt;
&lt;br /&gt;
In working with Stinger over the past year I have found some issues in the way that Stinger implemented handling of the HTTP request.  In short, it overlooked the fact that a parameter can have multiple values.  This has been corrected and will be available for download within the next week or two.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Security Fix: Stinger 2.5 Released - 13:32, 12 August 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Meder Kydyraliev recently brought to my attention a flawed assumption in the implementation of a J2EE filter-based input validation solution. Much of the J2EE HttpServletRequest API assumes the content of a POST request is form-urlencoded. Calls like &amp;quot;getParameter(String)&amp;quot; and &amp;quot;getParameterNames()&amp;quot; will only return values of a form-urlencoded POST request. Consequently, these API will return nothing of the body of the request is multipart encoded, allowing the attacker to bypass filter-based validation.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Bypassing_servlet_input_validation_filters_%28OWASP_Stinger_%2B_Struts_example%29 Click here] for the original write-up provided by Meder Kydyraliev.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Stinger_Version_2 Click here] to download Stinger 2.5&lt;br /&gt;
&lt;br /&gt;
 '''Stinger 2.4 Released - 13:58, 21 May 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project is proud to release Stinger 2.4. As noted in RC1, this release is intended to address code quality issues as well as implement several community suggested updates. The following is a list of notable changes:&lt;br /&gt;
&lt;br /&gt;
:*Backported the Stinger 3.0 &amp;quot;DROP/CONTINUE/PROCESS&amp;quot; doAction() logic. No need for &amp;quot;BreakChainException&amp;quot;&lt;br /&gt;
:*Cleaned up some code quality issues (removed all instances of System.out and printStackTrace, using interfaces properly, fixed synchronization issues)&lt;br /&gt;
:*Added the ability to define an &amp;quot;exclude&amp;quot; list which searches for patterns within a pattern. For example, if we allow the character '.' and the character '/', we may want to prevent instances of '../'. This can now be done by adding an &amp;quot;&amp;lt;exclude&amp;gt;../&amp;lt;/exclude&amp;gt;&amp;quot; tag underneath the &amp;quot;&amp;lt;regex&amp;gt;&amp;lt;/regex&amp;gt;&amp;quot; element of a rule. See the example &amp;quot;stinger.xml&amp;quot; file included with the Stinger Eclipse project for more information.&lt;br /&gt;
:*Modified the Log action to hashsession ID's before logging them as well as fixed &amp;quot;getHandler()&amp;quot; property default bug&lt;br /&gt;
:*The inclusion of the &amp;quot;exclude-set&amp;quot; value which tells Stinger to do nothing with these pages. Useful for patterns that cover too much (ex. *.*)&lt;br /&gt;
:*The stinger.xml file is expected to be found relative to /WEB-INF. This means that we simply set the filter-init &amp;quot;config&amp;quot; parameter to &amp;quot;stinger.xml&amp;quot; rather than &amp;quot;C:\Documents and Settings....\WEB-INF\stinger.xml&amp;quot;&lt;br /&gt;
:*Removed the &amp;quot;DisplayMessage&amp;quot; action as it is not very useful&lt;br /&gt;
:*Added better logging throughout the code base&lt;br /&gt;
&lt;br /&gt;
You can get the latest Stinger release [http://www.owasp.org/index.php/OWASP_Stinger_2_Releases here].&lt;br /&gt;
&lt;br /&gt;
 '''Stinger 2.4 RC1 Released - 11:40, 29 January 2007 (EST)'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project is proud to release Stinger 2.4 RC1. This release is largely intended to address some code quality issues.&lt;br /&gt;
&lt;br /&gt;
The following is a list of notable changes:&lt;br /&gt;
&lt;br /&gt;
:* We now allow for an &amp;quot;exclude&amp;quot; option for each parameter. After defining a regular expression for a parameter, we can now define strings that should *NOT* exist within the input. For example, let us assume our regular expression accepts all numbers, characters, a period, and a slash (/). However, note that &amp;quot;aaa../../etc/passwd&amp;quot; would be considered a valid input. Therefore, we can specify an &amp;quot;exclude&amp;quot; tag to prevent such input: &lt;br /&gt;
 ...&lt;br /&gt;
 &amp;lt;rule&amp;gt;&lt;br /&gt;
    &amp;lt;name&amp;gt;file&amp;lt;/name&amp;gt;&lt;br /&gt;
    &amp;lt;regex&amp;gt;filetext&amp;lt;/regex&amp;gt;&lt;br /&gt;
    &amp;lt;exclude&amp;gt;../&amp;lt;/exclude&amp;gt;&lt;br /&gt;
 ...&lt;br /&gt;
:* The &amp;quot;invalidate&amp;quot; action will properly clear the cookie from the user's browser.&lt;br /&gt;
&lt;br /&gt;
The current list of tasks to complete is as follows:&lt;br /&gt;
&lt;br /&gt;
:* Remove the absolute path dependence when specifying the Stinger configuration file in web.xml&lt;br /&gt;
&lt;br /&gt;
As always, let me know if you have any suggestions for improving the Stinger 2.4 release!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Stinger_2_Releases Click here] for the Stinger 2.x release page.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Stinger_News Click here for old news...]'''&lt;br /&gt;
&lt;br /&gt;
==Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find Stinger useful. Please contribute back to the project by sending your comments, questions, and suggestions to the Stinger mailing list. Thanks!&lt;br /&gt;
&lt;br /&gt;
To join the OWASP Stinger mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-stinger subscription page].&lt;br /&gt;
&lt;br /&gt;
==Donations==&lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project is purely an open-source community driven effort. As such, all projects and research efforts are contributed and maintained with an individual's ''spare time.'' If you have found this or any other project useful, please support OWASP with a [https://www.owasp.org/index.php/Contributions donation].&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors== &lt;br /&gt;
&lt;br /&gt;
None at this time&lt;br /&gt;
[[Category:OWASP Validation Project]]&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Stinger_Project&amp;diff=59155</id>
		<title>Category:OWASP Stinger Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Stinger_Project&amp;diff=59155"/>
				<updated>2009-04-17T17:18:14Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: /* Project Lead */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
&lt;br /&gt;
Developers consistently implement sporadic, ad-hoc input validation mechanisms for web applications. Lack of a centralized and well-defined input validation mechanism opens the application to a variety of attacks: including SQL Injection, Cross Site Scripting (XSS), and Command Injection. The OWASP Stinger Project aims to develop a centralized input validation component which can be easily applied to existing or developmental applications. Using a declarative security model, Stinger has the ability to validate all HTTP requests coming into an application. Stinger is such a simplistic yet strong validation engine that organizations have begun integrating it into their software development life-cycle.&lt;br /&gt;
&lt;br /&gt;
==Project Lead==&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project is looking for a new leader! If you are interested, please contact [mailto:Wesley.M.West@ge.com Wesley West].&lt;br /&gt;
&lt;br /&gt;
==License==&lt;br /&gt;
&lt;br /&gt;
Stinger is offered under the [http://www.gnu.org/copyleft/lesser.html LGPL]. For further information on OWASP licenses, please consult the [[OWASP Licenses]] page.&lt;br /&gt;
&lt;br /&gt;
==Versions==&lt;br /&gt;
&lt;br /&gt;
:*[[OWASP Stinger Version 2|Click here]] to view the OWASP Stinger 2.x Project page&lt;br /&gt;
:*'''''Deprecated''''' [[OWASP Stinger Version 1|Click here]] to view the OWASP Stinger 1.x Project page&lt;br /&gt;
:*'''''Defunct''''' [[OWASP Stinger Version 3|Click here]] to view the OWASP Stinger 3.x Project page&lt;br /&gt;
&lt;br /&gt;
==Stinger News==&lt;br /&gt;
&lt;br /&gt;
 '''Latest version available! - 25 March 2009 '''&lt;br /&gt;
&lt;br /&gt;
Well, I have updated the site with version 2.2.2 of Stinger for JDK 1.4. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Major Flaw: New versions coming soon! - 26 August 2008 '''&lt;br /&gt;
&lt;br /&gt;
In working with Stinger over the past year I have found some issues in the way that Stinger implemented handling of the HTTP request.  In short, it overlooked the fact that a parameter can have multiple values.  This has been corrected and will be available for download within the next week or two.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Security Fix: Stinger 2.5 Released - 13:32, 12 August 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Meder Kydyraliev recently brought to my attention a flawed assumption in the implementation of a J2EE filter-based input validation solution. Much of the J2EE HttpServletRequest API assumes the content of a POST request is form-urlencoded. Calls like &amp;quot;getParameter(String)&amp;quot; and &amp;quot;getParameterNames()&amp;quot; will only return values of a form-urlencoded POST request. Consequently, these API will return nothing of the body of the request is multipart encoded, allowing the attacker to bypass filter-based validation.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Bypassing_servlet_input_validation_filters_%28OWASP_Stinger_%2B_Struts_example%29 Click here] for the original write-up provided by Meder Kydyraliev.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Stinger_Version_2 Click here] to download Stinger 2.5&lt;br /&gt;
&lt;br /&gt;
 '''Stinger 2.4 Released - 13:58, 21 May 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project is proud to release Stinger 2.4. As noted in RC1, this release is intended to address code quality issues as well as implement several community suggested updates. The following is a list of notable changes:&lt;br /&gt;
&lt;br /&gt;
:*Backported the Stinger 3.0 &amp;quot;DROP/CONTINUE/PROCESS&amp;quot; doAction() logic. No need for &amp;quot;BreakChainException&amp;quot;&lt;br /&gt;
:*Cleaned up some code quality issues (removed all instances of System.out and printStackTrace, using interfaces properly, fixed synchronization issues)&lt;br /&gt;
:*Added the ability to define an &amp;quot;exclude&amp;quot; list which searches for patterns within a pattern. For example, if we allow the character '.' and the character '/', we may want to prevent instances of '../'. This can now be done by adding an &amp;quot;&amp;lt;exclude&amp;gt;../&amp;lt;/exclude&amp;gt;&amp;quot; tag underneath the &amp;quot;&amp;lt;regex&amp;gt;&amp;lt;/regex&amp;gt;&amp;quot; element of a rule. See the example &amp;quot;stinger.xml&amp;quot; file included with the Stinger Eclipse project for more information.&lt;br /&gt;
:*Modified the Log action to hashsession ID's before logging them as well as fixed &amp;quot;getHandler()&amp;quot; property default bug&lt;br /&gt;
:*The inclusion of the &amp;quot;exclude-set&amp;quot; value which tells Stinger to do nothing with these pages. Useful for patterns that cover too much (ex. *.*)&lt;br /&gt;
:*The stinger.xml file is expected to be found relative to /WEB-INF. This means that we simply set the filter-init &amp;quot;config&amp;quot; parameter to &amp;quot;stinger.xml&amp;quot; rather than &amp;quot;C:\Documents and Settings....\WEB-INF\stinger.xml&amp;quot;&lt;br /&gt;
:*Removed the &amp;quot;DisplayMessage&amp;quot; action as it is not very useful&lt;br /&gt;
:*Added better logging throughout the code base&lt;br /&gt;
&lt;br /&gt;
You can get the latest Stinger release [http://www.owasp.org/index.php/OWASP_Stinger_2_Releases here].&lt;br /&gt;
&lt;br /&gt;
 '''Stinger 2.4 RC1 Released - 11:40, 29 January 2007 (EST)'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project is proud to release Stinger 2.4 RC1. This release is largely intended to address some code quality issues.&lt;br /&gt;
&lt;br /&gt;
The following is a list of notable changes:&lt;br /&gt;
&lt;br /&gt;
:* We now allow for an &amp;quot;exclude&amp;quot; option for each parameter. After defining a regular expression for a parameter, we can now define strings that should *NOT* exist within the input. For example, let us assume our regular expression accepts all numbers, characters, a period, and a slash (/). However, note that &amp;quot;aaa../../etc/passwd&amp;quot; would be considered a valid input. Therefore, we can specify an &amp;quot;exclude&amp;quot; tag to prevent such input: &lt;br /&gt;
 ...&lt;br /&gt;
 &amp;lt;rule&amp;gt;&lt;br /&gt;
    &amp;lt;name&amp;gt;file&amp;lt;/name&amp;gt;&lt;br /&gt;
    &amp;lt;regex&amp;gt;filetext&amp;lt;/regex&amp;gt;&lt;br /&gt;
    &amp;lt;exclude&amp;gt;../&amp;lt;/exclude&amp;gt;&lt;br /&gt;
 ...&lt;br /&gt;
:* The &amp;quot;invalidate&amp;quot; action will properly clear the cookie from the user's browser.&lt;br /&gt;
&lt;br /&gt;
The current list of tasks to complete is as follows:&lt;br /&gt;
&lt;br /&gt;
:* Remove the absolute path dependence when specifying the Stinger configuration file in web.xml&lt;br /&gt;
&lt;br /&gt;
As always, let me know if you have any suggestions for improving the Stinger 2.4 release!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Stinger_2_Releases Click here] for the Stinger 2.x release page.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Stinger_News Click here for old news...]'''&lt;br /&gt;
&lt;br /&gt;
==Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find Stinger useful. Please contribute back to the project by sending your comments, questions, and suggestions to the Stinger mailing list. Thanks!&lt;br /&gt;
&lt;br /&gt;
To join the OWASP Stinger mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-stinger subscription page].&lt;br /&gt;
&lt;br /&gt;
==Donations==&lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project is purely an open-source community driven effort. As such, all projects and research efforts are contributed and maintained with an individual's ''spare time.'' If you have found this or any other project useful, please support OWASP with a [https://www.owasp.org/index.php/Contributions donation].&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors== &lt;br /&gt;
&lt;br /&gt;
None at this time&lt;br /&gt;
[[Category:OWASP Validation Project]]&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Stinger_Project&amp;diff=57369</id>
		<title>Category:OWASP Stinger Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Stinger_Project&amp;diff=57369"/>
				<updated>2009-03-25T17:53:59Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: /* Versions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
&lt;br /&gt;
Developers consistently implement sporadic, ad-hoc input validation mechanisms for web applications. Lack of a centralized and well-defined input validation mechanism opens the application to a variety of attacks: including SQL Injection, Cross Site Scripting (XSS), and Command Injection. The OWASP Stinger Project aims to develop a centralized input validation component which can be easily applied to existing or developmental applications. Using a declarative security model, Stinger has the ability to validate all HTTP requests coming into an application. Stinger is such a simplistic yet strong validation engine that organizations have begun integrating it into their software development life-cycle.&lt;br /&gt;
&lt;br /&gt;
==Project Lead==&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project leader is [mailto:Wesley.M.West@ge.com Wesley West].&lt;br /&gt;
&lt;br /&gt;
==License==&lt;br /&gt;
&lt;br /&gt;
Stinger is offered under the [http://www.gnu.org/copyleft/lesser.html LGPL]. For further information on OWASP licenses, please consult the [[OWASP Licenses]] page.&lt;br /&gt;
&lt;br /&gt;
==Versions==&lt;br /&gt;
&lt;br /&gt;
:*[[OWASP Stinger Version 2|Click here]] to view the OWASP Stinger 2.x Project page&lt;br /&gt;
:*'''''Deprecated''''' [[OWASP Stinger Version 1|Click here]] to view the OWASP Stinger 1.x Project page&lt;br /&gt;
:*'''''Defunct''''' [[OWASP Stinger Version 3|Click here]] to view the OWASP Stinger 3.x Project page&lt;br /&gt;
&lt;br /&gt;
==Stinger News==&lt;br /&gt;
&lt;br /&gt;
 '''Latest version available! - 25 March 2009 '''&lt;br /&gt;
&lt;br /&gt;
Well, I have updated the site with version 2.2.2 of Stinger for JDK 1.4. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Major Flaw: New versions coming soon! - 26 August 2008 '''&lt;br /&gt;
&lt;br /&gt;
In working with Stinger over the past year I have found some issues in the way that Stinger implemented handling of the HTTP request.  In short, it overlooked the fact that a parameter can have multiple values.  This has been corrected and will be available for download within the next week or two.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Security Fix: Stinger 2.5 Released - 13:32, 12 August 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Meder Kydyraliev recently brought to my attention a flawed assumption in the implementation of a J2EE filter-based input validation solution. Much of the J2EE HttpServletRequest API assumes the content of a POST request is form-urlencoded. Calls like &amp;quot;getParameter(String)&amp;quot; and &amp;quot;getParameterNames()&amp;quot; will only return values of a form-urlencoded POST request. Consequently, these API will return nothing of the body of the request is multipart encoded, allowing the attacker to bypass filter-based validation.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Bypassing_servlet_input_validation_filters_%28OWASP_Stinger_%2B_Struts_example%29 Click here] for the original write-up provided by Meder Kydyraliev.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Stinger_Version_2 Click here] to download Stinger 2.5&lt;br /&gt;
&lt;br /&gt;
 '''Stinger 2.4 Released - 13:58, 21 May 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project is proud to release Stinger 2.4. As noted in RC1, this release is intended to address code quality issues as well as implement several community suggested updates. The following is a list of notable changes:&lt;br /&gt;
&lt;br /&gt;
:*Backported the Stinger 3.0 &amp;quot;DROP/CONTINUE/PROCESS&amp;quot; doAction() logic. No need for &amp;quot;BreakChainException&amp;quot;&lt;br /&gt;
:*Cleaned up some code quality issues (removed all instances of System.out and printStackTrace, using interfaces properly, fixed synchronization issues)&lt;br /&gt;
:*Added the ability to define an &amp;quot;exclude&amp;quot; list which searches for patterns within a pattern. For example, if we allow the character '.' and the character '/', we may want to prevent instances of '../'. This can now be done by adding an &amp;quot;&amp;lt;exclude&amp;gt;../&amp;lt;/exclude&amp;gt;&amp;quot; tag underneath the &amp;quot;&amp;lt;regex&amp;gt;&amp;lt;/regex&amp;gt;&amp;quot; element of a rule. See the example &amp;quot;stinger.xml&amp;quot; file included with the Stinger Eclipse project for more information.&lt;br /&gt;
:*Modified the Log action to hashsession ID's before logging them as well as fixed &amp;quot;getHandler()&amp;quot; property default bug&lt;br /&gt;
:*The inclusion of the &amp;quot;exclude-set&amp;quot; value which tells Stinger to do nothing with these pages. Useful for patterns that cover too much (ex. *.*)&lt;br /&gt;
:*The stinger.xml file is expected to be found relative to /WEB-INF. This means that we simply set the filter-init &amp;quot;config&amp;quot; parameter to &amp;quot;stinger.xml&amp;quot; rather than &amp;quot;C:\Documents and Settings....\WEB-INF\stinger.xml&amp;quot;&lt;br /&gt;
:*Removed the &amp;quot;DisplayMessage&amp;quot; action as it is not very useful&lt;br /&gt;
:*Added better logging throughout the code base&lt;br /&gt;
&lt;br /&gt;
You can get the latest Stinger release [http://www.owasp.org/index.php/OWASP_Stinger_2_Releases here].&lt;br /&gt;
&lt;br /&gt;
 '''Stinger 2.4 RC1 Released - 11:40, 29 January 2007 (EST)'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project is proud to release Stinger 2.4 RC1. This release is largely intended to address some code quality issues.&lt;br /&gt;
&lt;br /&gt;
The following is a list of notable changes:&lt;br /&gt;
&lt;br /&gt;
:* We now allow for an &amp;quot;exclude&amp;quot; option for each parameter. After defining a regular expression for a parameter, we can now define strings that should *NOT* exist within the input. For example, let us assume our regular expression accepts all numbers, characters, a period, and a slash (/). However, note that &amp;quot;aaa../../etc/passwd&amp;quot; would be considered a valid input. Therefore, we can specify an &amp;quot;exclude&amp;quot; tag to prevent such input: &lt;br /&gt;
 ...&lt;br /&gt;
 &amp;lt;rule&amp;gt;&lt;br /&gt;
    &amp;lt;name&amp;gt;file&amp;lt;/name&amp;gt;&lt;br /&gt;
    &amp;lt;regex&amp;gt;filetext&amp;lt;/regex&amp;gt;&lt;br /&gt;
    &amp;lt;exclude&amp;gt;../&amp;lt;/exclude&amp;gt;&lt;br /&gt;
 ...&lt;br /&gt;
:* The &amp;quot;invalidate&amp;quot; action will properly clear the cookie from the user's browser.&lt;br /&gt;
&lt;br /&gt;
The current list of tasks to complete is as follows:&lt;br /&gt;
&lt;br /&gt;
:* Remove the absolute path dependence when specifying the Stinger configuration file in web.xml&lt;br /&gt;
&lt;br /&gt;
As always, let me know if you have any suggestions for improving the Stinger 2.4 release!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Stinger_2_Releases Click here] for the Stinger 2.x release page.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Stinger_News Click here for old news...]'''&lt;br /&gt;
&lt;br /&gt;
==Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find Stinger useful. Please contribute back to the project by sending your comments, questions, and suggestions to the Stinger mailing list. Thanks!&lt;br /&gt;
&lt;br /&gt;
To join the OWASP Stinger mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-stinger subscription page].&lt;br /&gt;
&lt;br /&gt;
==Donations==&lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project is purely an open-source community driven effort. As such, all projects and research efforts are contributed and maintained with an individual's ''spare time.'' If you have found this or any other project useful, please support OWASP with a [https://www.owasp.org/index.php/Contributions donation].&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors== &lt;br /&gt;
&lt;br /&gt;
None at this time&lt;br /&gt;
[[Category:OWASP Validation Project]]&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Stinger_Version_2&amp;diff=57368</id>
		<title>OWASP Stinger Version 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Stinger_Version_2&amp;diff=57368"/>
				<updated>2009-03-25T17:42:48Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: /* Project Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
&lt;br /&gt;
The J2EE platform does not include any validation features. This leaves many organizations to craft their own validation mechanisms, often incomplete, flawed, and inefficient.&lt;br /&gt;
&lt;br /&gt;
OWASP Stinger 2.x is an implementation of the design principals detailed in the [http://www.owasp.org/index.php/OWASP_Validation_Documentation_Project OWASP Validation Documentation]. The basic idea is to define validation rules for the cookies and parameters of an HTTP request. These rules are specified in simple XML files using the 'Security Validation Definition Language.' Furthermore, Stinger 2 is implemented as a J2EE filter such that all HTTP traffic is validated ''before'' it is ever processed by the web application.&lt;br /&gt;
&lt;br /&gt;
==Project Lead==&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project leader is [mailto:Wesley.M.West@ge.com Wesley West].&lt;br /&gt;
&lt;br /&gt;
==License==&lt;br /&gt;
&lt;br /&gt;
Stinger is offered under the [http://www.gnu.org/copyleft/lesser.html LGPL]. For further information on OWASP licenses, please consult the [[OWASP Licenses]] page.&lt;br /&gt;
&lt;br /&gt;
==Downloads==&lt;br /&gt;
&lt;br /&gt;
:*[http://www.owasp.org/index.php/OWASP_Stinger_2_Releases Click here] to view all OWASP Stinger 2.x releases&lt;br /&gt;
:*[http://www.owasp.org/index.php/OWASP_Stinger_Manual Click here] to view the OWASP Stinger 2.x Manual&lt;br /&gt;
&lt;br /&gt;
==Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find Stinger useful. Please contribute back to the project by sending your comments, questions, and suggestions to the Stinger mailing list. Thanks!&lt;br /&gt;
&lt;br /&gt;
To join the OWASP Stinger mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-stinger subscription page].&lt;br /&gt;
&lt;br /&gt;
==Donations==&lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project is purely an open-source community driven effort. As such, all projects and research efforts are contributed and maintained with an individual's ''spare time.'' If you have found this or any other project useful, please support OWASP with a [https://www.owasp.org/index.php/Contributions donation].&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors== &lt;br /&gt;
&lt;br /&gt;
None at this time.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Stinger Project]]&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Stinger-2.2.2-Release-JDK1.4.jar&amp;diff=57367</id>
		<title>File:Stinger-2.2.2-Release-JDK1.4.jar</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Stinger-2.2.2-Release-JDK1.4.jar&amp;diff=57367"/>
				<updated>2009-03-25T17:41:41Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: uploaded a new version of &amp;quot;Image:Stinger-2.2.2-Release-JDK1.4.jar&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Stinger_Version_2&amp;diff=57366</id>
		<title>OWASP Stinger Version 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Stinger_Version_2&amp;diff=57366"/>
				<updated>2009-03-25T17:40:29Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: /* Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
&lt;br /&gt;
The J2EE platform does not include any validation features. This leaves many organizations to craft their own validation mechanisms, often incomplete, flawed, and inefficient.&lt;br /&gt;
&lt;br /&gt;
OWASP Stinger 2.x is an implementation of the design principals detailed in the [http://www.owasp.org/index.php/OWASP_Validation_Documentation_Project OWASP Validation Documentation]. The basic idea is to define validation rules for the cookies and parameters of an HTTP request. These rules are specified in simple XML files using the 'Security Validation Definition Language.' Furthermore, Stinger 2 is implemented as a J2EE filter such that all HTTP traffic is validated ''before'' it is ever processed by the web application.&lt;br /&gt;
&lt;br /&gt;
==Project Lead==&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project leader is [mailto:Wesley.M.West@ge.com Wesley West].&lt;br /&gt;
&lt;br /&gt;
==License==&lt;br /&gt;
&lt;br /&gt;
Stinger is offered under the [http://www.gnu.org/copyleft/lesser.html LGPL]. For further information on OWASP licenses, please consult the [[OWASP Licenses]] page.&lt;br /&gt;
&lt;br /&gt;
==Downloads==&lt;br /&gt;
&lt;br /&gt;
:*[http://www.owasp.org/index.php/OWASP_Stinger_2_Releases Click here] to view all OWASP Stinger 2.x releases&lt;br /&gt;
:*[http://www.owasp.org/index.php/OWASP_Stinger_Manual Click here] to view the OWASP Stinger 2.x Manual&lt;br /&gt;
&lt;br /&gt;
==Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find Stinger useful. Please contribute back to the project by sending your comments, questions, and suggestions to the Stinger mailing list. Thanks!&lt;br /&gt;
&lt;br /&gt;
To join the OWASP Stinger mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-stinger subscription page].&lt;br /&gt;
&lt;br /&gt;
==Donations==&lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project is purely an open-source community driven effort. As such, all projects and research efforts are contributed and maintained with an individual's ''spare time.'' If you have found this or any other project useful, please support OWASP with a [https://www.owasp.org/index.php/Contributions donation].&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors== &lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger project is sponsored by [http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Stinger Project]]&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Stinger_Project&amp;diff=57365</id>
		<title>Category:OWASP Stinger Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Stinger_Project&amp;diff=57365"/>
				<updated>2009-03-25T17:39:35Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: /* Stinger News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
&lt;br /&gt;
Developers consistently implement sporadic, ad-hoc input validation mechanisms for web applications. Lack of a centralized and well-defined input validation mechanism opens the application to a variety of attacks: including SQL Injection, Cross Site Scripting (XSS), and Command Injection. The OWASP Stinger Project aims to develop a centralized input validation component which can be easily applied to existing or developmental applications. Using a declarative security model, Stinger has the ability to validate all HTTP requests coming into an application. Stinger is such a simplistic yet strong validation engine that organizations have begun integrating it into their software development life-cycle.&lt;br /&gt;
&lt;br /&gt;
==Project Lead==&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project leader is [mailto:Wesley.M.West@ge.com Wesley West].&lt;br /&gt;
&lt;br /&gt;
==License==&lt;br /&gt;
&lt;br /&gt;
Stinger is offered under the [http://www.gnu.org/copyleft/lesser.html LGPL]. For further information on OWASP licenses, please consult the [[OWASP Licenses]] page.&lt;br /&gt;
&lt;br /&gt;
==Versions==&lt;br /&gt;
&lt;br /&gt;
:*[[OWASP Stinger Version 1|Click here]] to view the OWASP Stinger 1.x Project page&lt;br /&gt;
:*[[OWASP Stinger Version 2|Click here]] to view the OWASP Stinger 2.x Project page&lt;br /&gt;
:*[[OWASP Stinger Version 3|Click here]] to view the OWASP Stinger 3.x Project page&lt;br /&gt;
&lt;br /&gt;
==Stinger News==&lt;br /&gt;
&lt;br /&gt;
 '''Latest version available! - 25 March 2009 '''&lt;br /&gt;
&lt;br /&gt;
Well, I have updated the site with version 2.2.2 of Stinger for JDK 1.4. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Major Flaw: New versions coming soon! - 26 August 2008 '''&lt;br /&gt;
&lt;br /&gt;
In working with Stinger over the past year I have found some issues in the way that Stinger implemented handling of the HTTP request.  In short, it overlooked the fact that a parameter can have multiple values.  This has been corrected and will be available for download within the next week or two.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Security Fix: Stinger 2.5 Released - 13:32, 12 August 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Meder Kydyraliev recently brought to my attention a flawed assumption in the implementation of a J2EE filter-based input validation solution. Much of the J2EE HttpServletRequest API assumes the content of a POST request is form-urlencoded. Calls like &amp;quot;getParameter(String)&amp;quot; and &amp;quot;getParameterNames()&amp;quot; will only return values of a form-urlencoded POST request. Consequently, these API will return nothing of the body of the request is multipart encoded, allowing the attacker to bypass filter-based validation.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Bypassing_servlet_input_validation_filters_%28OWASP_Stinger_%2B_Struts_example%29 Click here] for the original write-up provided by Meder Kydyraliev.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Stinger_Version_2 Click here] to download Stinger 2.5&lt;br /&gt;
&lt;br /&gt;
 '''Stinger 2.4 Released - 13:58, 21 May 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project is proud to release Stinger 2.4. As noted in RC1, this release is intended to address code quality issues as well as implement several community suggested updates. The following is a list of notable changes:&lt;br /&gt;
&lt;br /&gt;
:*Backported the Stinger 3.0 &amp;quot;DROP/CONTINUE/PROCESS&amp;quot; doAction() logic. No need for &amp;quot;BreakChainException&amp;quot;&lt;br /&gt;
:*Cleaned up some code quality issues (removed all instances of System.out and printStackTrace, using interfaces properly, fixed synchronization issues)&lt;br /&gt;
:*Added the ability to define an &amp;quot;exclude&amp;quot; list which searches for patterns within a pattern. For example, if we allow the character '.' and the character '/', we may want to prevent instances of '../'. This can now be done by adding an &amp;quot;&amp;lt;exclude&amp;gt;../&amp;lt;/exclude&amp;gt;&amp;quot; tag underneath the &amp;quot;&amp;lt;regex&amp;gt;&amp;lt;/regex&amp;gt;&amp;quot; element of a rule. See the example &amp;quot;stinger.xml&amp;quot; file included with the Stinger Eclipse project for more information.&lt;br /&gt;
:*Modified the Log action to hashsession ID's before logging them as well as fixed &amp;quot;getHandler()&amp;quot; property default bug&lt;br /&gt;
:*The inclusion of the &amp;quot;exclude-set&amp;quot; value which tells Stinger to do nothing with these pages. Useful for patterns that cover too much (ex. *.*)&lt;br /&gt;
:*The stinger.xml file is expected to be found relative to /WEB-INF. This means that we simply set the filter-init &amp;quot;config&amp;quot; parameter to &amp;quot;stinger.xml&amp;quot; rather than &amp;quot;C:\Documents and Settings....\WEB-INF\stinger.xml&amp;quot;&lt;br /&gt;
:*Removed the &amp;quot;DisplayMessage&amp;quot; action as it is not very useful&lt;br /&gt;
:*Added better logging throughout the code base&lt;br /&gt;
&lt;br /&gt;
You can get the latest Stinger release [http://www.owasp.org/index.php/OWASP_Stinger_2_Releases here].&lt;br /&gt;
&lt;br /&gt;
 '''Stinger 2.4 RC1 Released - 11:40, 29 January 2007 (EST)'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project is proud to release Stinger 2.4 RC1. This release is largely intended to address some code quality issues.&lt;br /&gt;
&lt;br /&gt;
The following is a list of notable changes:&lt;br /&gt;
&lt;br /&gt;
:* We now allow for an &amp;quot;exclude&amp;quot; option for each parameter. After defining a regular expression for a parameter, we can now define strings that should *NOT* exist within the input. For example, let us assume our regular expression accepts all numbers, characters, a period, and a slash (/). However, note that &amp;quot;aaa../../etc/passwd&amp;quot; would be considered a valid input. Therefore, we can specify an &amp;quot;exclude&amp;quot; tag to prevent such input: &lt;br /&gt;
 ...&lt;br /&gt;
 &amp;lt;rule&amp;gt;&lt;br /&gt;
    &amp;lt;name&amp;gt;file&amp;lt;/name&amp;gt;&lt;br /&gt;
    &amp;lt;regex&amp;gt;filetext&amp;lt;/regex&amp;gt;&lt;br /&gt;
    &amp;lt;exclude&amp;gt;../&amp;lt;/exclude&amp;gt;&lt;br /&gt;
 ...&lt;br /&gt;
:* The &amp;quot;invalidate&amp;quot; action will properly clear the cookie from the user's browser.&lt;br /&gt;
&lt;br /&gt;
The current list of tasks to complete is as follows:&lt;br /&gt;
&lt;br /&gt;
:* Remove the absolute path dependence when specifying the Stinger configuration file in web.xml&lt;br /&gt;
&lt;br /&gt;
As always, let me know if you have any suggestions for improving the Stinger 2.4 release!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Stinger_2_Releases Click here] for the Stinger 2.x release page.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Stinger_News Click here for old news...]'''&lt;br /&gt;
&lt;br /&gt;
==Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find Stinger useful. Please contribute back to the project by sending your comments, questions, and suggestions to the Stinger mailing list. Thanks!&lt;br /&gt;
&lt;br /&gt;
To join the OWASP Stinger mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-stinger subscription page].&lt;br /&gt;
&lt;br /&gt;
==Donations==&lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project is purely an open-source community driven effort. As such, all projects and research efforts are contributed and maintained with an individual's ''spare time.'' If you have found this or any other project useful, please support OWASP with a [https://www.owasp.org/index.php/Contributions donation].&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors== &lt;br /&gt;
&lt;br /&gt;
None at this time&lt;br /&gt;
[[Category:OWASP Validation Project]]&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Stinger_2_Releases&amp;diff=57364</id>
		<title>OWASP Stinger 2 Releases</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Stinger_2_Releases&amp;diff=57364"/>
				<updated>2009-03-25T17:27:22Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: /* Stinger 2.2 - Latest Build! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Stinger 2.2.2 - Latest Build!==  &lt;br /&gt;
Fixed fundamental issues with request objects and included multipart check from 2.5&lt;br /&gt;
&lt;br /&gt;
===JDK 1.4===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.2.2-Release-JDK1.4.jar Click here] to download Stinger 2.2 Release for JDK 1.4&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.2.2-Release-JDK1.4.zip Click here] to download Stinger 2.2 Release Eclipse Project for JDK 1.4&lt;br /&gt;
&lt;br /&gt;
==Stinger 2.5==&lt;br /&gt;
&lt;br /&gt;
=== JDK 5.0 ===&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Image:Stinger-2.5.jar Click here] to download Stinger 2.5 for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Image:Stinger-2.5.zip Click here] to download Stinger 2.5 Eclipse Project for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
==Stinger 2.4==&lt;br /&gt;
&lt;br /&gt;
=== JDK 5.0 ===&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Image:Stinger-2.4.jar Click here] to download Stinger 2.4 for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Image:Stinger-2.4.zip Click here] to download Stinger 2.4 Eclipse Project for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
==Stinger 2.4 RC1==&lt;br /&gt;
&lt;br /&gt;
=== JDK 5.0 ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.4-RC1-20070129.jar Click here] to download Stinger 2.4 RC1 for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.4-RC1.zip Click here] to download Stinger 2.4 RC1 Eclipse Project for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
==Stinger 2.2==&lt;br /&gt;
&lt;br /&gt;
===JDK 5.0===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.2-Release-JDK5.0.jar Click here] to download Stinger 2.2 Release for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.2-Release-JDK5.0.zip Click here] to download Stinger 2.2 Release Eclipse Project for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
===JDK 1.4===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.2.2-Release-JDK1.4.jar Click here] to download Stinger 2.2 Release for JDK 1.4&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.2.2-Release-JDK1.4.zip Click here] to download Stinger 2.2 Release Eclipse Project for JDK 1.4&lt;br /&gt;
&lt;br /&gt;
==Stinger 2.0==&lt;br /&gt;
&lt;br /&gt;
===JDK 5.0===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.0-Lite-Release-JDK5-20061102.jar Click here] to download Stinger 2.0 Release for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.0-Lite-Release-JDK50.zip Click here] to download the Stinger 2.0 Release Eclipse Project!&lt;br /&gt;
&lt;br /&gt;
==Stinger 2.0 Development==&lt;br /&gt;
&lt;br /&gt;
===JDK 5.0===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/releases/Stinger/2.0rc1/Stinger-2.0-Lite-rc1-20060926.jar Click here] to download the Stinger 2.0 RC1 deployment jar file!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/releases/Stinger/2.0rc1/Stinger-2.0-Lite.zip Click here] to download the Stinger 2.0 RC1 Eclipse project!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/releases/Stinger/2.0beta1/Stinger2.0Beta1.2.zip Click here] to download Stinger 2.0 Beta 1!&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Stinger-2.2.2-Release-JDK1.4.zip&amp;diff=57363</id>
		<title>File:Stinger-2.2.2-Release-JDK1.4.zip</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Stinger-2.2.2-Release-JDK1.4.zip&amp;diff=57363"/>
				<updated>2009-03-25T17:24:46Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: uploaded a new version of &amp;quot;Image:Stinger-2.2.2-Release-JDK1.4.zip&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Stinger_Project&amp;diff=57362</id>
		<title>Category:OWASP Stinger Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Stinger_Project&amp;diff=57362"/>
				<updated>2009-03-25T17:16:50Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: /* Project Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
&lt;br /&gt;
Developers consistently implement sporadic, ad-hoc input validation mechanisms for web applications. Lack of a centralized and well-defined input validation mechanism opens the application to a variety of attacks: including SQL Injection, Cross Site Scripting (XSS), and Command Injection. The OWASP Stinger Project aims to develop a centralized input validation component which can be easily applied to existing or developmental applications. Using a declarative security model, Stinger has the ability to validate all HTTP requests coming into an application. Stinger is such a simplistic yet strong validation engine that organizations have begun integrating it into their software development life-cycle.&lt;br /&gt;
&lt;br /&gt;
==Project Lead==&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project leader is [mailto:Wesley.M.West@ge.com Wesley West].&lt;br /&gt;
&lt;br /&gt;
==License==&lt;br /&gt;
&lt;br /&gt;
Stinger is offered under the [http://www.gnu.org/copyleft/lesser.html LGPL]. For further information on OWASP licenses, please consult the [[OWASP Licenses]] page.&lt;br /&gt;
&lt;br /&gt;
==Versions==&lt;br /&gt;
&lt;br /&gt;
:*[[OWASP Stinger Version 1|Click here]] to view the OWASP Stinger 1.x Project page&lt;br /&gt;
:*[[OWASP Stinger Version 2|Click here]] to view the OWASP Stinger 2.x Project page&lt;br /&gt;
:*[[OWASP Stinger Version 3|Click here]] to view the OWASP Stinger 3.x Project page&lt;br /&gt;
&lt;br /&gt;
==Stinger News==&lt;br /&gt;
&lt;br /&gt;
 '''Major Flaw: New versions coming soon! - 26 August 2008 '''&lt;br /&gt;
&lt;br /&gt;
In working with Stinger over the past year I have found some issues in the way that Stinger implemented handling of the HTTP request.  In short, it overlooked the fact that a parameter can have multiple values.  This has been corrected and will be available for download within the next week or two.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Security Fix: Stinger 2.5 Released - 13:32, 12 August 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Meder Kydyraliev recently brought to my attention a flawed assumption in the implementation of a J2EE filter-based input validation solution. Much of the J2EE HttpServletRequest API assumes the content of a POST request is form-urlencoded. Calls like &amp;quot;getParameter(String)&amp;quot; and &amp;quot;getParameterNames()&amp;quot; will only return values of a form-urlencoded POST request. Consequently, these API will return nothing of the body of the request is multipart encoded, allowing the attacker to bypass filter-based validation.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Bypassing_servlet_input_validation_filters_%28OWASP_Stinger_%2B_Struts_example%29 Click here] for the original write-up provided by Meder Kydyraliev.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Stinger_Version_2 Click here] to download Stinger 2.5&lt;br /&gt;
&lt;br /&gt;
 '''Stinger 2.4 Released - 13:58, 21 May 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project is proud to release Stinger 2.4. As noted in RC1, this release is intended to address code quality issues as well as implement several community suggested updates. The following is a list of notable changes:&lt;br /&gt;
&lt;br /&gt;
:*Backported the Stinger 3.0 &amp;quot;DROP/CONTINUE/PROCESS&amp;quot; doAction() logic. No need for &amp;quot;BreakChainException&amp;quot;&lt;br /&gt;
:*Cleaned up some code quality issues (removed all instances of System.out and printStackTrace, using interfaces properly, fixed synchronization issues)&lt;br /&gt;
:*Added the ability to define an &amp;quot;exclude&amp;quot; list which searches for patterns within a pattern. For example, if we allow the character '.' and the character '/', we may want to prevent instances of '../'. This can now be done by adding an &amp;quot;&amp;lt;exclude&amp;gt;../&amp;lt;/exclude&amp;gt;&amp;quot; tag underneath the &amp;quot;&amp;lt;regex&amp;gt;&amp;lt;/regex&amp;gt;&amp;quot; element of a rule. See the example &amp;quot;stinger.xml&amp;quot; file included with the Stinger Eclipse project for more information.&lt;br /&gt;
:*Modified the Log action to hashsession ID's before logging them as well as fixed &amp;quot;getHandler()&amp;quot; property default bug&lt;br /&gt;
:*The inclusion of the &amp;quot;exclude-set&amp;quot; value which tells Stinger to do nothing with these pages. Useful for patterns that cover too much (ex. *.*)&lt;br /&gt;
:*The stinger.xml file is expected to be found relative to /WEB-INF. This means that we simply set the filter-init &amp;quot;config&amp;quot; parameter to &amp;quot;stinger.xml&amp;quot; rather than &amp;quot;C:\Documents and Settings....\WEB-INF\stinger.xml&amp;quot;&lt;br /&gt;
:*Removed the &amp;quot;DisplayMessage&amp;quot; action as it is not very useful&lt;br /&gt;
:*Added better logging throughout the code base&lt;br /&gt;
&lt;br /&gt;
You can get the latest Stinger release [http://www.owasp.org/index.php/OWASP_Stinger_2_Releases here].&lt;br /&gt;
&lt;br /&gt;
 '''Stinger 2.4 RC1 Released - 11:40, 29 January 2007 (EST)'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project is proud to release Stinger 2.4 RC1. This release is largely intended to address some code quality issues.&lt;br /&gt;
&lt;br /&gt;
The following is a list of notable changes:&lt;br /&gt;
&lt;br /&gt;
:* We now allow for an &amp;quot;exclude&amp;quot; option for each parameter. After defining a regular expression for a parameter, we can now define strings that should *NOT* exist within the input. For example, let us assume our regular expression accepts all numbers, characters, a period, and a slash (/). However, note that &amp;quot;aaa../../etc/passwd&amp;quot; would be considered a valid input. Therefore, we can specify an &amp;quot;exclude&amp;quot; tag to prevent such input: &lt;br /&gt;
 ...&lt;br /&gt;
 &amp;lt;rule&amp;gt;&lt;br /&gt;
    &amp;lt;name&amp;gt;file&amp;lt;/name&amp;gt;&lt;br /&gt;
    &amp;lt;regex&amp;gt;filetext&amp;lt;/regex&amp;gt;&lt;br /&gt;
    &amp;lt;exclude&amp;gt;../&amp;lt;/exclude&amp;gt;&lt;br /&gt;
 ...&lt;br /&gt;
:* The &amp;quot;invalidate&amp;quot; action will properly clear the cookie from the user's browser.&lt;br /&gt;
&lt;br /&gt;
The current list of tasks to complete is as follows:&lt;br /&gt;
&lt;br /&gt;
:* Remove the absolute path dependence when specifying the Stinger configuration file in web.xml&lt;br /&gt;
&lt;br /&gt;
As always, let me know if you have any suggestions for improving the Stinger 2.4 release!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Stinger_2_Releases Click here] for the Stinger 2.x release page.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Stinger_News Click here for old news...]'''&lt;br /&gt;
&lt;br /&gt;
==Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find Stinger useful. Please contribute back to the project by sending your comments, questions, and suggestions to the Stinger mailing list. Thanks!&lt;br /&gt;
&lt;br /&gt;
To join the OWASP Stinger mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-stinger subscription page].&lt;br /&gt;
&lt;br /&gt;
==Donations==&lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project is purely an open-source community driven effort. As such, all projects and research efforts are contributed and maintained with an individual's ''spare time.'' If you have found this or any other project useful, please support OWASP with a [https://www.owasp.org/index.php/Contributions donation].&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors== &lt;br /&gt;
&lt;br /&gt;
None at this time&lt;br /&gt;
[[Category:OWASP Validation Project]]&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Stinger_Version_3&amp;diff=57361</id>
		<title>OWASP Stinger Version 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Stinger_Version_3&amp;diff=57361"/>
				<updated>2009-03-25T17:15:43Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
&lt;br /&gt;
'''Development work on version 3 never got much past the concept stage as there was significant work to do to stabilize the previous versions and correct some problems. ''' &lt;br /&gt;
The J2EE platform does not include any validation features. This leaves many organizations to craft their own validation mechanisms, often incomplete, flawed, and inefficient.&lt;br /&gt;
&lt;br /&gt;
The 3.x series will mark the inclusion of web application firewall specific features. OWASP Stinger 3.x will have some of the following notable features:&lt;br /&gt;
&lt;br /&gt;
:* Validation of the entire HTTP request: including URI, headers, cookies, and parameters&lt;br /&gt;
:* A robust &amp;quot;learning&amp;quot; mode to make rule generation simplistic and efficient.&lt;br /&gt;
:* A full web application dedicated to editing the OWASP Stinger configuration files&lt;br /&gt;
&lt;br /&gt;
Check out the full list of new features being implemented at the [http://www.owasp.org/index.php/OWASP_Stinger_3_Ideas OWASP Stinger 3.x ideas page].&lt;br /&gt;
&lt;br /&gt;
==Project Lead==&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project leader is [mailto:Wesley.M.West@ge.com Wesley West].&lt;br /&gt;
&lt;br /&gt;
==License==&lt;br /&gt;
&lt;br /&gt;
Stinger is offered under the [http://www.gnu.org/copyleft/lesser.html LGPL]. For further information on OWASP licenses, please consult the [[OWASP Licenses]] page.&lt;br /&gt;
&lt;br /&gt;
==Downloads==&lt;br /&gt;
&lt;br /&gt;
:*[http://www.owasp.org/index.php/OWASP_Stinger_3_Ideas Click here] to view the OWASP Stinger 3.x ideas page!&lt;br /&gt;
:* Due to the development status of Stinger 3.0, no downloads currently exist.&lt;br /&gt;
&lt;br /&gt;
==Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find Stinger useful. Please contribute back to the project by sending your comments, questions, and suggestions to the Stinger mailing list. Thanks!&lt;br /&gt;
&lt;br /&gt;
To join the OWASP Stinger mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-stinger subscription page].&lt;br /&gt;
&lt;br /&gt;
==Donations==&lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project is purely an open-source community driven effort. As such, all projects and research efforts are contributed and maintained with an individual's ''spare time.'' If you have found this or any other project useful, please support OWASP with a [https://www.owasp.org/index.php/Contributions donation].&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors== &lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger project is sponsored by [http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Stinger Project]]&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Stinger_Version_3&amp;diff=57360</id>
		<title>OWASP Stinger Version 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Stinger_Version_3&amp;diff=57360"/>
				<updated>2009-03-25T17:15:17Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
&lt;br /&gt;
Development work on version 3 never got much past the concept stage as there was significant work to do to stabilize the previous versions and correct some problems.  &lt;br /&gt;
&lt;br /&gt;
The J2EE platform does not include any validation features. This leaves many organizations to craft their own validation mechanisms, often incomplete, flawed, and inefficient.&lt;br /&gt;
&lt;br /&gt;
The 3.x series will mark the inclusion of web application firewall specific features. OWASP Stinger 3.x will have some of the following notable features:&lt;br /&gt;
&lt;br /&gt;
:* Validation of the entire HTTP request: including URI, headers, cookies, and parameters&lt;br /&gt;
:* A robust &amp;quot;learning&amp;quot; mode to make rule generation simplistic and efficient.&lt;br /&gt;
:* A full web application dedicated to editing the OWASP Stinger configuration files&lt;br /&gt;
&lt;br /&gt;
Check out the full list of new features being implemented at the [http://www.owasp.org/index.php/OWASP_Stinger_3_Ideas OWASP Stinger 3.x ideas page].&lt;br /&gt;
&lt;br /&gt;
==Project Lead==&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project leader is [mailto:Wesley.M.West@ge.com Wesley West].&lt;br /&gt;
&lt;br /&gt;
==License==&lt;br /&gt;
&lt;br /&gt;
Stinger is offered under the [http://www.gnu.org/copyleft/lesser.html LGPL]. For further information on OWASP licenses, please consult the [[OWASP Licenses]] page.&lt;br /&gt;
&lt;br /&gt;
==Downloads==&lt;br /&gt;
&lt;br /&gt;
:*[http://www.owasp.org/index.php/OWASP_Stinger_3_Ideas Click here] to view the OWASP Stinger 3.x ideas page!&lt;br /&gt;
:* Due to the development status of Stinger 3.0, no downloads currently exist.&lt;br /&gt;
&lt;br /&gt;
==Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find Stinger useful. Please contribute back to the project by sending your comments, questions, and suggestions to the Stinger mailing list. Thanks!&lt;br /&gt;
&lt;br /&gt;
To join the OWASP Stinger mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-stinger subscription page].&lt;br /&gt;
&lt;br /&gt;
==Donations==&lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project is purely an open-source community driven effort. As such, all projects and research efforts are contributed and maintained with an individual's ''spare time.'' If you have found this or any other project useful, please support OWASP with a [https://www.owasp.org/index.php/Contributions donation].&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors== &lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger project is sponsored by [http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Stinger Project]]&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Stinger_2_Releases&amp;diff=46286</id>
		<title>OWASP Stinger 2 Releases</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Stinger_2_Releases&amp;diff=46286"/>
				<updated>2008-11-12T15:47:42Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Stinger 2.2 - Latest Build!==&lt;br /&gt;
&lt;br /&gt;
===JDK 1.4===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.2.2-Release-JDK1.4.jar Click here] to download Stinger 2.2 Release for JDK 1.4&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.2.2-Release-JDK1.4.zip Click here] to download Stinger 2.2 Release Eclipse Project for JDK 1.4&lt;br /&gt;
&lt;br /&gt;
==Stinger 2.5==&lt;br /&gt;
&lt;br /&gt;
=== JDK 5.0 ===&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Image:Stinger-2.5.jar Click here] to download Stinger 2.5 for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Image:Stinger-2.5.zip Click here] to download Stinger 2.5 Eclipse Project for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
==Stinger 2.4==&lt;br /&gt;
&lt;br /&gt;
=== JDK 5.0 ===&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Image:Stinger-2.4.jar Click here] to download Stinger 2.4 for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Image:Stinger-2.4.zip Click here] to download Stinger 2.4 Eclipse Project for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
==Stinger 2.4 RC1==&lt;br /&gt;
&lt;br /&gt;
=== JDK 5.0 ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.4-RC1-20070129.jar Click here] to download Stinger 2.4 RC1 for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.4-RC1.zip Click here] to download Stinger 2.4 RC1 Eclipse Project for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
==Stinger 2.2==&lt;br /&gt;
&lt;br /&gt;
===JDK 5.0===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.2-Release-JDK5.0.jar Click here] to download Stinger 2.2 Release for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.2-Release-JDK5.0.zip Click here] to download Stinger 2.2 Release Eclipse Project for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
===JDK 1.4===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.2.2-Release-JDK1.4.jar Click here] to download Stinger 2.2 Release for JDK 1.4&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.2.2-Release-JDK1.4.zip Click here] to download Stinger 2.2 Release Eclipse Project for JDK 1.4&lt;br /&gt;
&lt;br /&gt;
==Stinger 2.0==&lt;br /&gt;
&lt;br /&gt;
===JDK 5.0===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.0-Lite-Release-JDK5-20061102.jar Click here] to download Stinger 2.0 Release for JDK 5.0&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Stinger-2.0-Lite-Release-JDK50.zip Click here] to download the Stinger 2.0 Release Eclipse Project!&lt;br /&gt;
&lt;br /&gt;
==Stinger 2.0 Development==&lt;br /&gt;
&lt;br /&gt;
===JDK 5.0===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/releases/Stinger/2.0rc1/Stinger-2.0-Lite-rc1-20060926.jar Click here] to download the Stinger 2.0 RC1 deployment jar file!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/releases/Stinger/2.0rc1/Stinger-2.0-Lite.zip Click here] to download the Stinger 2.0 RC1 Eclipse project!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/releases/Stinger/2.0beta1/Stinger2.0Beta1.2.zip Click here] to download Stinger 2.0 Beta 1!&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Stinger-2.2.2-Release-JDK1.4.jar&amp;diff=46282</id>
		<title>File:Stinger-2.2.2-Release-JDK1.4.jar</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Stinger-2.2.2-Release-JDK1.4.jar&amp;diff=46282"/>
				<updated>2008-11-12T15:39:43Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Stinger-2.2.2-Release-JDK1.4.zip&amp;diff=46279</id>
		<title>File:Stinger-2.2.2-Release-JDK1.4.zip</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Stinger-2.2.2-Release-JDK1.4.zip&amp;diff=46279"/>
				<updated>2008-11-12T15:35:11Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Stinger_Version_1&amp;diff=37286</id>
		<title>OWASP Stinger Version 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Stinger_Version_1&amp;diff=37286"/>
				<updated>2008-08-26T18:44:18Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: /* Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
&lt;br /&gt;
The J2EE platform does not include any validation features. This leaves many organizations to craft their own validation mechanisms, often incomplete, flawed, and inefficient. The basic idea is to define validation rules for the headers, cookies, and parameters of an HTTP request. These rules are specified in simple XML files using the 'Security Validation Definition Language.'&lt;br /&gt;
&lt;br /&gt;
==Project Lead==&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project leader is [mailto:Wesley.M.West@ge.com Wesley West].&lt;br /&gt;
&lt;br /&gt;
==License==&lt;br /&gt;
&lt;br /&gt;
Stinger is offered under the [http://www.gnu.org/copyleft/lesser.html LGPL]. For further information on OWASP licenses, please consult the [[OWASP Licenses]] page.&lt;br /&gt;
&lt;br /&gt;
==Downloads==&lt;br /&gt;
&lt;br /&gt;
The 1.x version is no longer maintained or supported.&lt;br /&gt;
&lt;br /&gt;
:*[http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=130521 Click here] to download the latest version of the OWASP Stinger 1.x series&lt;br /&gt;
:*[http://www.owasp.org/index.php/How_to_Build_an_HTTP_Request_Validation_Engine_for_Your_J2EE_Application Click here] to read about the OWASP Stinger 1.0 implementation&lt;br /&gt;
&lt;br /&gt;
==Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find Stinger useful. Please contribute back to the project by sending your comments, questions, and suggestions to the Stinger mailing list. Thanks!&lt;br /&gt;
&lt;br /&gt;
To join the OWASP Stinger mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-stinger subscription page].&lt;br /&gt;
&lt;br /&gt;
==Donations==&lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project is purely an open-source community driven effort. As such, all projects and research efforts are contributed and maintained with an individual's ''spare time.'' If you have found this or any other project useful, please support OWASP with a [https://www.owasp.org/index.php/Contributions donation].&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors== &lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger project is sponsored by [http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Stinger Project]]&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Stinger_Project&amp;diff=37282</id>
		<title>Category:OWASP Stinger Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Stinger_Project&amp;diff=37282"/>
				<updated>2008-08-26T16:18:06Z</updated>
		
		<summary type="html">&lt;p&gt;Weswest: /* Stinger News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
&lt;br /&gt;
Developers consistently implement sporadic, ad-hoc input validation mechanisms for web applications. Lack of a centralized and well-defined input validation mechanism opens the application to a variety of attacks: including SQL Injection, Cross Site Scripting (XSS), and Command Injection. The OWASP Stinger Project aims to develop a centralized input validation component which can be easily applied to existing or developmental applications. Using a declarative security model, Stinger has the ability to validate all HTTP requests coming into an application. Stinger is such a simplistic yet strong validation engine that organizations have begun integrating it into their software development life-cycle.&lt;br /&gt;
&lt;br /&gt;
==Project Lead==&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project leader is [mailto:Wesley.M.West@ge.com Wesley West].&lt;br /&gt;
&lt;br /&gt;
==License==&lt;br /&gt;
&lt;br /&gt;
Stinger is offered under the [http://www.gnu.org/copyleft/lesser.html LGPL]. For further information on OWASP licenses, please consult the [[OWASP Licenses]] page.&lt;br /&gt;
&lt;br /&gt;
==Versions==&lt;br /&gt;
&lt;br /&gt;
:*[[OWASP Stinger Version 1|Click here]] to view the OWASP Stinger 1.x Project page&lt;br /&gt;
:*[[OWASP Stinger Version 2|Click here]] to view the OWASP Stinger 2.x Project page&lt;br /&gt;
:*[[OWASP Stinger Version 3|Click here]] to view the OWASP Stinger 3.x Project page&lt;br /&gt;
&lt;br /&gt;
==Stinger News==&lt;br /&gt;
&lt;br /&gt;
 '''Major Flaw: New versions coming soon! - 26 August 2008 '''&lt;br /&gt;
&lt;br /&gt;
In working with Stinger over the past year I have found some issues in the way that Stinger implemented handling of the HTTP request.  In short, it overlooked the fact that a parameter can have multiple values.  This has been corrected and will be available for download within the next week or two.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Security Fix: Stinger 2.5 Released - 13:32, 12 August 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
Meder Kydyraliev recently brought to my attention a flawed assumption in the implementation of a J2EE filter-based input validation solution. Much of the J2EE HttpServletRequest API assumes the content of a POST request is form-urlencoded. Calls like &amp;quot;getParameter(String)&amp;quot; and &amp;quot;getParameterNames()&amp;quot; will only return values of a form-urlencoded POST request. Consequently, these API will return nothing of the body of the request is multipart encoded, allowing the attacker to bypass filter-based validation.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Bypassing_servlet_input_validation_filters_%28OWASP_Stinger_%2B_Struts_example%29 Click here] for the original write-up provided by Meder Kydyraliev.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Stinger_Version_2 Click here] to download Stinger 2.5&lt;br /&gt;
&lt;br /&gt;
 '''Stinger 2.4 Released - 13:58, 21 May 2007 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project is proud to release Stinger 2.4. As noted in RC1, this release is intended to address code quality issues as well as implement several community suggested updates. The following is a list of notable changes:&lt;br /&gt;
&lt;br /&gt;
:*Backported the Stinger 3.0 &amp;quot;DROP/CONTINUE/PROCESS&amp;quot; doAction() logic. No need for &amp;quot;BreakChainException&amp;quot;&lt;br /&gt;
:*Cleaned up some code quality issues (removed all instances of System.out and printStackTrace, using interfaces properly, fixed synchronization issues)&lt;br /&gt;
:*Added the ability to define an &amp;quot;exclude&amp;quot; list which searches for patterns within a pattern. For example, if we allow the character '.' and the character '/', we may want to prevent instances of '../'. This can now be done by adding an &amp;quot;&amp;lt;exclude&amp;gt;../&amp;lt;/exclude&amp;gt;&amp;quot; tag underneath the &amp;quot;&amp;lt;regex&amp;gt;&amp;lt;/regex&amp;gt;&amp;quot; element of a rule. See the example &amp;quot;stinger.xml&amp;quot; file included with the Stinger Eclipse project for more information.&lt;br /&gt;
:*Modified the Log action to hashsession ID's before logging them as well as fixed &amp;quot;getHandler()&amp;quot; property default bug&lt;br /&gt;
:*The inclusion of the &amp;quot;exclude-set&amp;quot; value which tells Stinger to do nothing with these pages. Useful for patterns that cover too much (ex. *.*)&lt;br /&gt;
:*The stinger.xml file is expected to be found relative to /WEB-INF. This means that we simply set the filter-init &amp;quot;config&amp;quot; parameter to &amp;quot;stinger.xml&amp;quot; rather than &amp;quot;C:\Documents and Settings....\WEB-INF\stinger.xml&amp;quot;&lt;br /&gt;
:*Removed the &amp;quot;DisplayMessage&amp;quot; action as it is not very useful&lt;br /&gt;
:*Added better logging throughout the code base&lt;br /&gt;
&lt;br /&gt;
You can get the latest Stinger release [http://www.owasp.org/index.php/OWASP_Stinger_2_Releases here].&lt;br /&gt;
&lt;br /&gt;
 '''Stinger 2.4 RC1 Released - 11:40, 29 January 2007 (EST)'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger Project is proud to release Stinger 2.4 RC1. This release is largely intended to address some code quality issues.&lt;br /&gt;
&lt;br /&gt;
The following is a list of notable changes:&lt;br /&gt;
&lt;br /&gt;
:* We now allow for an &amp;quot;exclude&amp;quot; option for each parameter. After defining a regular expression for a parameter, we can now define strings that should *NOT* exist within the input. For example, let us assume our regular expression accepts all numbers, characters, a period, and a slash (/). However, note that &amp;quot;aaa../../etc/passwd&amp;quot; would be considered a valid input. Therefore, we can specify an &amp;quot;exclude&amp;quot; tag to prevent such input: &lt;br /&gt;
 ...&lt;br /&gt;
 &amp;lt;rule&amp;gt;&lt;br /&gt;
    &amp;lt;name&amp;gt;file&amp;lt;/name&amp;gt;&lt;br /&gt;
    &amp;lt;regex&amp;gt;filetext&amp;lt;/regex&amp;gt;&lt;br /&gt;
    &amp;lt;exclude&amp;gt;../&amp;lt;/exclude&amp;gt;&lt;br /&gt;
 ...&lt;br /&gt;
:* The &amp;quot;invalidate&amp;quot; action will properly clear the cookie from the user's browser.&lt;br /&gt;
&lt;br /&gt;
The current list of tasks to complete is as follows:&lt;br /&gt;
&lt;br /&gt;
:* Remove the absolute path dependence when specifying the Stinger configuration file in web.xml&lt;br /&gt;
&lt;br /&gt;
As always, let me know if you have any suggestions for improving the Stinger 2.4 release!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Stinger_2_Releases Click here] for the Stinger 2.x release page.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Stinger_News Click here for old news...]'''&lt;br /&gt;
&lt;br /&gt;
==Feedback and Participation ==&lt;br /&gt;
&lt;br /&gt;
We hope you find Stinger useful. Please contribute back to the project by sending your comments, questions, and suggestions to the Stinger mailing list. Thanks!&lt;br /&gt;
&lt;br /&gt;
To join the OWASP Stinger mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-stinger subscription page].&lt;br /&gt;
&lt;br /&gt;
==Donations==&lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project is purely an open-source community driven effort. As such, all projects and research efforts are contributed and maintained with an individual's ''spare time.'' If you have found this or any other project useful, please support OWASP with a [https://www.owasp.org/index.php/Contributions donation].&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors== &lt;br /&gt;
&lt;br /&gt;
The OWASP Stinger project is sponsored by [http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Validation Project]]&lt;/div&gt;</summary>
		<author><name>Weswest</name></author>	</entry>

	</feed>