This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of ".NET AntiXSS Library"

From OWASP
Jump to: navigation, search
m (Adding attribution to the XSS Cheatsheet link)
m (XSS References)
Line 30: Line 30:
 
* https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet
 
* https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet
 
* [http://ha.ckers.org/xssAttacks.xml RSnake's XSS Cheatsheet] (in XML format; nice for programatic consumption!)
 
* [http://ha.ckers.org/xssAttacks.xml RSnake's XSS Cheatsheet] (in XML format; nice for programatic consumption!)
 +
* http://lockmedown.com/preventing-xss-in-asp-net-made-easy (A comprehensive guide to cover the full web stack against XSS)
 
* TODO add more references here -- Troy Hunt's material is excellent - I'm sure more people in the world have content which would be valuable here to reference...
 
* TODO add more references here -- Troy Hunt's material is excellent - I'm sure more people in the world have content which would be valuable here to reference...
  

Revision as of 17:18, 20 February 2015

NOTE: This content is a work in progress and all contribution is welcome. Please contact Jeff Knutson with questions, ideas, corrections, etc.

Overview

Cross site scripting (XSS) continues to show up on the as a top vulnerability every year. While very pervasive and dangerous, this vulnerability is possible to mitigate with reasonable developer effort. This page is dedicated to helping mitigate this vulnerability in regards to the Microsoft .NET Framework.

Attack Vectors

The primary XSS attack vectors are:

  • Reflected XSS
  • Persistent XSS

Please see Cross-site Scripting (XSS) for more detail regarding reflected and persistent XSS attacks.

Options

XSS References

TODO

Now

  • Look at the Microsoft implementations
  • See what work has already been done in the OWASP space for XSS
  • See what other work has been done for XSS (both .NET and other technology stacks)
  • Illustrate vulnerabilities and how to mitigate them (e.g. WebGoat.NET)
  • See if we can get the OWASP Anti-Samy project back into relevance

Future

  • Dream big here!