This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of ".NET AntiXSS Library"

From OWASP
Jump to: navigation, search
m
Line 1: Line 1:
(NOTE:) This content is a work in progress and all contribution is welcome.  Please contact Jeff Knutson ([[User:Jeff Knutson]]) with questions, ideas, corrections, etc.
+
'''NOTE''': This content is a work in progress and all contribution is welcome.  Please contact [[User:Jeff Knutson|Jeff Knutson]] with questions, ideas, corrections, etc.
  
 
== Overview ==
 
== Overview ==

Revision as of 13:47, 15 April 2014

NOTE: This content is a work in progress and all contribution is welcome. Please contact Jeff Knutson with questions, ideas, corrections, etc.

Overview

Cross site scripting (XSS) continues to show up on the as a top vulnerability every year. While very pervasive and dangerous, this vulnerability is possible to mitigate with reasonable developer effort. This page is dedicated to helping mitigate this vulnerability in regards to the Microsoft .NET Framework.

Challenges

The primary XSS attack vectors are:

  • Reflected XSS
  • Persistent XSS

Options

XSS References

TODO

Now

  • Look at the Microsoft implementations
  • See what work has already been done in the OWASP space for XSS
  • See what other work has been done for XSS (both .NET and other technology stacks)
  • Illustrate vulnerabilities and how to mitigate them (e.g. WebGoat)
  • See if we can get the OWASP Anti-Samy project back into relevance

Future

  • Dream big here!