This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Category:OWASP Encoding Project"
Meddington (talk | contribs) (→Download) |
|||
Line 1: | Line 1: | ||
+ | {| style="width:100%; background:white" align="center" border="0"| | ||
+ | | colspan="4" style="width:100%; background:white" align="center" | | ||
+ | |- | ||
+ | | style="width:10%; background:#white" align="center" | [[Image:Attention icon.png|50px]] | ||
+ | | style="width:80%; background:#white" align="center" | | ||
+ | This Project has been identified as an orphaned one. If you find interest in assuming its lead, please contact the [[:Category:Global Projects Committee|Global Projects Committee]]. | ||
+ | | style="width:10%; background:#white" align="center" | [[Image:Attention icon.png|50px]] | ||
+ | |} | ||
+ | |||
+ | |||
+ | |||
== Overview == | == Overview == | ||
Line 60: | Line 71: | ||
[http://leviathansecurity.com Leviathan Security Group, Inc.] | [http://leviathansecurity.com Leviathan Security Group, Inc.] | ||
− | [[Category:OWASP Project]] | + | [[Category:OWASP Project|Encoding Project]] |
[[Category:OWASP Download]] | [[Category:OWASP Download]] | ||
[[Category:OWASP Tool]] | [[Category:OWASP Tool]] | ||
__NOTOC__ | __NOTOC__ |
Revision as of 18:03, 3 July 2009
This Project has been identified as an orphaned one. If you find interest in assuming its lead, please contact the Global Projects Committee. |
Overview
Web applications face any number of threats; one of them is cross-site scripting and related injection attacks. 90% of all web applications contain cross-site scripting attacks because they are easy to introduce, and the proper tools are not always available to prevent them. The Reform library provides a solid set of functions for encoding output for the most common context targets in web applications (e.g. HTML, XML, JavaScript, etc). The library also takes a conservative view of what are allowable characters based on historical vulnerabilities, and current injection techniques.
Goals
- Provide tools needed by developers to mitigate canonicalization issues in web technologies.
- Provide a solution that will not need to be patched (no security patches since release in 2004, private implementations in use since 2002).
Download
Reform-0.12.zip (stable)
The latest code is now being maintained in a Google Code repository [1]
Features
- Unicode support
- Context specific functions (HTML, XML, JavaScript, etc)
- Many supported languages
- Java
- .NET v1/v2
- PHP
- Python
- Perl
- JavaScript
- ASP
- Support for AJAX
- Conservative approach
- Solves all current XSS techniques
- Full xUnit style test cases
Future Development
- Ruby support
- Java framework support
- LDAP encoding functions
- Add documentation on resolving XPath issues
News
OWASP Encoding Project Adopts Reform - 10:01, 8 November 2006 (EST)
OWASP is adopting the Reform Encoding Library as an OWASP project. We are currently in the process of moving over the source, downloads, and documentation.
OWASP Encoding Project Created! - 10:01, 8 November 2006 (EST)
The Open Web Application Security Project is proud to announce the OWASP Encoding Project!
Feedback and Participation:
We hope you find the OWASP Encoding Project useful. Please contribute to the Project by volunteering for one of the tasks, sending your comments, questions, and suggestions to [email protected]. To join the OWASP Encoding Project mailing list or view the archives, please visit the subscription page.
Project Contributors
Project Sponsor
Leviathan Security Group, Inc.
This category currently contains no pages or media.