This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:Featured article"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
'''SANS and OWASP Partner to Add #1 Web Application Security to [http://www.sans.org/top20/?ref=1697#c1 SANS Top 20]'''
+
'''Two free Java EE filters for CSRF, Reflected XSS, and Adobe XSS'''
  
{| align="center"
+
OWASP contributors from '''[http://www.aspectsecurity.com Aspect Security]''' have developed two new Java EE filters to protect against common web attacks. Just add a few lines to your web.xml file and enjoy the protection.
| [http://www.sans.org/top20/?ref=1697#c1 https://www.owasp.org/images/8/80/SANS_Logo.jpg]
 
| [http://www.owasp.org https://www.owasp.org/images/f/f0/OWASP_Logo.gif]
 
|}
 
  
The SANS document is widely used, and we're extremely pleased that we could work with them to recognize the risks associated with web applications. From the document...
+
; '''[[CSRF Guard|CSRF and Reflected XSS Filter for Java EE]]
 +
: This filter adds a random token to forms and URLs that prevent an attacker from executing both [[CSRF]] and reflected [[XSS]] attacks.
  
"Every week hundreds of vulnerabilities are being reported in these web applications, and are being actively exploited. The number of attempted attacks every day for some of the large web hosting farms range from hundreds of thousands to even millions. All web frameworks (PHP, .NET, J2EE, Ruby on Rails, ColdFusion, Perl, etc) and all types of web applications are at risk from web application security defects, ranging from insufficient validation through to application logic errors."
+
; '''[[PDF Attack Filter for Java EE|Adobe XSS Filter for Java EE]]
 
+
: This filter protects against the recent XSS attacks on PDF files. By using a redirect and an encrypted token, this filter ensures that dangerous attacks are not passed into the Adobe reader plugin.
[http://www.sans.org/top20/?ref=1697#c1 Read more...]
 

Revision as of 02:21, 8 January 2007

Two free Java EE filters for CSRF, Reflected XSS, and Adobe XSS

OWASP contributors from Aspect Security have developed two new Java EE filters to protect against common web attacks. Just add a few lines to your web.xml file and enjoy the protection.

CSRF and Reflected XSS Filter for Java EE
This filter adds a random token to forms and URLs that prevent an attacker from executing both CSRF and reflected XSS attacks.
Adobe XSS Filter for Java EE
This filter protects against the recent XSS attacks on PDF files. By using a redirect and an encrypted token, this filter ensures that dangerous attacks are not passed into the Adobe reader plugin.