search for: xss

Displaying 20 results from an estimated 117 matches for "xss".

Did you mean: bss
2006 May 05
4
Is sanitize() strong enough to protect me from XSS?
Haven''t been able to find a good enough answer on whether using sanitize() is enough to really protect me from XSS attacks I basically have a blog page that I want to allow people to display comments on but would like to allow html tags to be posted on the comments, these could html tags like the imageshack img tags, youtube player, photobucket img tags etc any other approaches or suggestions to this problem...
2006 Jan 09
3
XSS prevention with Rails
Hi! I wanna take a stab at implementing better XSS prevention for Rails. This time for real =) I''m wondering what would be the better way, clean everything up with tidy first and then do the rest with regexp or regexp all the way? Anybody done this before? Thanks! Ciao! Florian
2005 May 13
5
HTML sanitizer
Hello! Does anybody know of a Ruby implementation of a HTML sanitizer that prevents the attacks described on the xss cheatsheet? (http://ha.ckers.org/xss.html) I checked out the version Jamis wrote (http://dev.rubyonrails.com/ticket/1277), but that only covers the very basic attacks. Anybody? Just figured I would ask before, before I reinvent the wheel.. Ciao! Florian
2009 Jun 04
0
XSS (was Re: Centos 5.3 -> Apache - Under Attack ? Oh hell....)
Bob Hoffman wrote: > Since each install uses the same pages basically, it is easy for a autobot > to find them all and zero day your forums, xss your whatever, and so on. > > Dang scary to leave JS on at all....even though you basically have too. Mozilla is beginning to address this issue with Content Security Policy -=- http://people.mozilla.org/~bsterne/content-security-policy/ -=- CSP will require pro-active webmasters who use...
2010 Feb 02
0
[Security] Loofah has an HTML injection / XSS vulnerability, please upgrade to 0.4.6
Synopsis ---------- Loofah::HTML::Document#text emits unencoded HTML entities prior to 0.4.6. This was originally by design, since the output of #text is intended to be used in a non-HTML context (such as generation of human-readable text documents). However, Loofah::XssFoliate''s default behavior and Loofah::Helpers#strip_tags both use #text to strip tags out of the output, meaning that the following input: &lt;script&gt;alert(''evil!'');&lt;/script&gt; would be rendered as <script>alert(''evil!''...
2015 Aug 11
4
Apache mod_perl cross site scripting vulnerability
...e can be prevented by using the default configuration for the Apache HTTP web server (not exporting /perl-status). I haven't used <Location /perl-status> but Trustwave still finds me vulnerable. Evidence: Request: GET /perl- status/APR::SockAddr::port/"><script>alert('xss')</script> HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) Host: www.mydomain.com Content-Type: text/html Content-Length: 0 Response: HTTP/1.1 404 Not Found Date: Mon, 07 Aug 2015 11:10:21 GMT Server: Apache/2.2.15 (CentOS) X-Powered-By: PHP/5.3.3 Set-C...
2015 Jun 13
2
C5 : Firefox 38 bug
On 06/12/2015 01:01 PM, Gordon Messmer wrote: > On 06/13/2015 11:11 AM, jd1008 wrote: >> All your browsing history, all cookies ...etc are open books >> as far as many javascripts are concerned. > > Javascript can use CSS attributes to see if you've visited a specific > URL, which is unfortunate, but that's a long way from saying that your > history is an open
2006 Jan 26
0
Article about protecting Rails apps from XSS attacks
Cross-Site scripting (XSS) attacks have been appearing lately, so I wrote up an article about one way to protect yourself. It''s pretty easy to use and, for those who care, I go into some of metaprogramming techniques I used to create it. Check it out at http://blog.explorationage.com/articles/2006/01/25/how-to-pro...
2012 Aug 10
0
Missing earlier versions work around for "XSS Vulnerability in strip_tags"
The rubyonrails-security announcement for CVE-2012-3465 "XSS Vulnerability in strip_tags" mentions that a work around for earlier versions should be attached, but there''s none, only patches for 3.0 series and up. Is the work around available? If so, where can I get hold of it? Thanks in advance, Peter -- Posted via http://www.ruby-forum.com...
2007 Jun 18
7
Testing for cross site scripting, etc.
Being new to testing and ruby, are there "standard" tests that can be done that test for things like cross site scripting and friends? If not, anyone have ideas on what I might do about testing those sorts of things? I''ll be using rails, also. Mike B. ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging
2006 Mar 10
3
Sweave scientific real display format (e.g. 5e-12)
Dear All, I couldn't figure and couldn't google out how to make construct a pair of \Sexpr s or a LaTeX macro that would include 5\cdot 10^{-12} into the LaTeX output istead of 5e-12 . Any ideas? Thank you G?bor
2012 Jul 29
4
R- Help (looping)
Hi, I'm Wellington from Brazil and I have the following issue: I've been working on a project a for a while, and I'm having trouble in using the loop (for) I need to read a column (c1), and for each value of this column, I need to check if it's within the control limits So, I was trying to do this: For (k in 1: c1) If (c1< lcl1 | c1 > ucl1) {here I
2004 May 26
7
File already in use?
Hi, I'm running 3.0.4 and have had several reports from users both using Office and Lotus where the application tells them that the file is already in use when we know it isn't. (BTW, there's a typo on the man page under "lock spin count". "acquired", not "aquired".) Chris -- Chris Garrigues http://www.DeepEddy.Com/~cwg/ Trinsic
2009 Sep 04
0
Question on the XSS Security Patch
After reading this security bulletin: http://groups.google.com/group/rubyonrails-security/msg/7f57cd7794e1d1b4?pli=1 I am a bit confused as to which patch I should apply. My application is currently running on a frozen copy of Rails 2.2.2. Reading the bulletin it appears that I should instead the 2-2-CVE-2009-3009.patch for the "2.2 series" of Rails. However, the patch introduces a
2013 Jun 04
0
Codec Mismatch
Sometimes in huge call volume am facing this type of error, [Jun 4 08:42:46] WARNING[8459][C-000079fa]: channel.c:5075 ast_write: Codec mismatch on channel Local/8038 at xss-call-out-00004774;1 setting write format to slin from ulaw native formats (ulaw) [Jun 4 08:43:04] WARNING[8285][C-000079da]: channel.c:5075 ast_write: Codec mismatch on channel Local/6513 at xss-call-out-00004775;1 setting write format to slin from ulaw native formats (ulaw) [Jun 4 08:43:10] WARN...
2008 Jun 06
2
Messy Cookies
...e-branch: http://github.com/judofyr/camping/commits/proper_cookies I''ve tested it with Firefox + LiveHTTPHeaders and it seems to work fine. If anyone spots a bug, please comment on a commit (or scream out on IRC)! Oh, and _why has to decide if we should make the session-system completely XSS-proof, or be a little more relaxed. It doesn''t have to be XSS-proof as long as you keep the cookies secret (aka, escapes all Javascript). -- Magnus Holm
2015 Jun 13
4
C5 : Firefox 38 bug
On 06/12/2015 11:25 AM, m.roth at 5-cent.us wrote: > jd1008 wrote: >> On 06/12/2015 07:28 AM, g wrote: >>> On 06/10/2015 03:56 AM, Always Learning wrote: >>>> I displayed, as a web page, a list of search results created in PHP, >>>> from MySQL. >>> i am still using 24.8.0 and do not have to contend with all the >>> bugs introduced by moz
2011 Jul 15
3
Ruby variable that embeds html tags
This seems very simple, but I can''t quite get it. Probably because I''m just starting out with RoR. My view has a slew of labels and text fields; many are "required": <%= f.text_field :screen_name %> <span class="required_field">Required field</span> (The "required_field" class turns the text red and smaller.) I''d like to
2008 May 19
6
Sample Code, quick simple openid auth
You''ll need to install the ''openid'' gem for this, and require it in your camping app: class Login < R ''/login'' def get this_url = ''http:'' + URL(''/login'').to_s unless input.finish.to_s == ''1'' # start doing the auth here begin
2006 Apr 18
4
Security considerations with displaying uploaded HTML
...provided? I saw something in AWDWR about sanitize() - any comments/advice on that? One thing I''m considering is rendering it on the server side and providing an image of the rendered to the user - then I only have to worry about being compromised on my server instead of worrying about XSS attacks. Does that make sense? Any thoughts or advice is appreciated. Wes -- Posted via http://www.ruby-forum.com/.