This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Abridged XSS Prevention Cheat Sheet"

From OWASP
Jump to: navigation, search
m
m
Line 37: Line 37:
 
| String
 
| String
 
| CSS
 
| CSS
| Strict structural validation, CSS Hex encoding, good design
+
| [https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet#RULE_.234_-_CSS_Escape_And_Strictly_Validate_Before_Inserting_Untrusted_Data_into_HTML_Style_Property_Values Strict structural validation, CSS Hex encoding, good design]
 
|-
 
|-
 
| String
 
| String
 
| HTML Text
 
| HTML Text
| HTML Validation (JSoup, AnMSamy, HTML Sanitizer)
+
| [https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet#RULE_.236_-_Use_an_HTML_Policy_engine_to_validate_or_clean_user-driven_HTML_in_an_outbound_way HTML Validation (JSoup, AnMSamy, HTML Sanitizer)]
 
|-
 
|-
 
| String
 
| String

Revision as of 23:16, 13 November 2011

Introduction

The following table briefly describes how to defeat Cross Site Scripting in a variety of different contexts.

XSS Prevention

Data Type Context Defense
Numeric, Type safe language Any Context Cast to Numeric
String HTML Body HTML Entity Encoding
String HTML Attribute, quoted HTML Entity Encode single and double quotes
String HTML Attribute, unquoted Aggressive HTML Entity Encoding
String GET Parameter URL Encoding
String Untrusted URL, HREF tag (or equivalent) URL Validation, reject javascript: URL’s, Whitelist http, https and other safe URL types, Attribute encoding, safe URL verification
String CSS Strict structural validation, CSS Hex encoding, good design
String HTML Text HTML Validation (JSoup, AnMSamy, HTML Sanitizer)
String DOM XSS DOM_based XSS Prevention Cheat Sheet

Related Articles

OWASP Cheat Sheets Project Homepage


Authors and Primary Editors

Jim Manico - jim [at] owasp.org