This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Category:OWASP Encoding Project"

From OWASP
Jump to: navigation, search
(Download)
Line 1: Line 1:
 +
{| style="width:100%; background:white" align="center" border="0"| 
 +
| colspan="4" style="width:100%; background:white" align="center" |
 +
|-
 +
| style="width:10%; background:#white" align="center" | [[Image:Attention icon.png|50px]]
 +
| style="width:80%; background:#white" align="center" |
 +
This Project has been identified as an orphaned one.  If you find interest in assuming its lead, please contact the [[:Category:Global Projects Committee|Global Projects Committee]].
 +
| style="width:10%; background:#white" align="center" | [[Image:Attention icon.png|50px]]
 +
|}
 +
 +
 +
 
== Overview ==
 
== Overview ==
  
Line 60: Line 71:
 
[http://leviathansecurity.com Leviathan Security Group, Inc.]
 
[http://leviathansecurity.com Leviathan Security Group, Inc.]
  
[[Category:OWASP Project]]
+
[[Category:OWASP Project|Encoding Project]]
 
[[Category:OWASP Download]]
 
[[Category:OWASP Download]]
 
[[Category:OWASP Tool]]
 
[[Category:OWASP Tool]]
  
 
__NOTOC__
 
__NOTOC__

Revision as of 18:03, 3 July 2009

Attention icon.png

This Project has been identified as an orphaned one. If you find interest in assuming its lead, please contact the Global Projects Committee.

Attention icon.png


Overview

Web applications face any number of threats; one of them is cross-site scripting and related injection attacks. 90% of all web applications contain cross-site scripting attacks because they are easy to introduce, and the proper tools are not always available to prevent them. The Reform library provides a solid set of functions for encoding output for the most common context targets in web applications (e.g. HTML, XML, JavaScript, etc). The library also takes a conservative view of what are allowable characters based on historical vulnerabilities, and current injection techniques.

Goals

  • Provide tools needed by developers to mitigate canonicalization issues in web technologies.
  • Provide a solution that will not need to be patched (no security patches since release in 2004, private implementations in use since 2002).

Download

Reform-0.12.zip (stable)

The latest code is now being maintained in a Google Code repository [1]

Features

  • Unicode support
  • Context specific functions (HTML, XML, JavaScript, etc)
  • Many supported languages
    • Java
    • .NET v1/v2
    • PHP
    • Python
    • Perl
    • JavaScript
    • ASP
  • Support for AJAX
  • Conservative approach
  • Solves all current XSS techniques
  • Full xUnit style test cases

Future Development

  • Ruby support
  • Java framework support
  • LDAP encoding functions
  • Add documentation on resolving XPath issues

News

OWASP Encoding Project Adopts Reform - 10:01, 8 November 2006 (EST)

OWASP is adopting the Reform Encoding Library as an OWASP project. We are currently in the process of moving over the source, downloads, and documentation.

OWASP Encoding Project Created! - 10:01, 8 November 2006 (EST)

The Open Web Application Security Project is proud to announce the OWASP Encoding Project!

Feedback and Participation:

We hope you find the OWASP Encoding Project useful. Please contribute to the Project by volunteering for one of the tasks, sending your comments, questions, and suggestions to [email protected]. To join the OWASP Encoding Project mailing list or view the archives, please visit the subscription page.

Project Contributors

Michael Eddington

Project Sponsor

Leviathan Security Group, Inc.

This category currently contains no pages or media.