zoukankan      html  css  js  c++  java
  • Will HTML Encoding prevent all kinds of XSS attacks?

    Will HTML Encoding prevent all kinds of XSS attacks?

    I am not concerned about other kinds of attacks. Just want to know whether HTML Encode can prevent all kinds of XSS attacks.

    Is there some way to do an XSS attack even if HTML Encode is used?

    回答

    No.

    Putting aside the subject of allowing some tags (not really the point of the question), HtmlEncode simply does NOT cover all XSS attacks.

    For instance, consider server-generated client-side javascript - the server dynamically outputs htmlencoded values directly into the client-side javascript, htmlencode will not stop injected script from executing.

    Next, consider the following pseudocode:

    <input value=<%= HtmlEncode(somevar) %> id=textbox>
    

    Now, in case its not immediately obvious, if somevar (sent by the user, of course) is set for example to

    a onclick=alert(document.cookie)
    

    the resulting output is

    <input value=a onclick=alert(document.cookie) id=textbox>
    

    which would clearly work. Obviously, this can be (almost) any other script... and HtmlEncode would not help much.

    There are a few additional vectors to be considered... including the third flavor of XSS, called DOM-based XSS (wherein the malicious script is generated dynamically on the client, e.g. based on # values).

    Also don't forget about UTF-7 type attacks - where the attack looks like

    +ADw-script+AD4-alert(document.cookie)+ADw-/script+AD4-
    

    Nothing much to encode there...

    The solution, of course (in addition to proper and restrictive white-list input validation), is to perform context-sensitive encoding: HtmlEncoding is great IF you're output context IS HTML, or maybe you need JavaScriptEncoding, or VBScriptEncoding, or AttributeValueEncoding, or... etc.

    If you're using MS ASP.NET, you can use their Anti-XSS Library, which provides all of the necessary context-encoding methods.

    Note that all encoding should not be restricted to user input, but also stored values from the database, text files, etc.

    Oh, and don't forget to explicitly set the charset, both in the HTTP header AND the META tag, otherwise you'll still have UTF-7 vulnerabilities...

    Some more information, and a pretty definitive list (constantly updated), check out RSnake's Cheat Sheet: http://ha.ckers.org/xss.html

    回答2

    If you systematically encode all user input before displaying then yes, you are safe you are still not 100 % safe.
    (See @Avid's post for more details)

    In addition problems arise when you need to let some tags go unencoded so that you allow users to post images or bold text or any feature that requires user's input be processed as (or converted to) un-encoded markup.

    You will have to set up a decision making system to decide which tags are allowed and which are not, and it is always possible that someone will figure out a way to let a non allowed tag to pass through.

    It helps if you follow Joel's advice of Making Wrong Code Look Wrong or if your language helps you by warning/not compiling when you are outputting unprocessed user data (static-typing).

     回答3

    No, just encoding common HTML tokens DOES NOT completely protect your site from XSS attacks. See, for example, this XSS vulnerability found in google.com:

    http://www.securiteam.com/securitynews/6Z00L0AEUE.html

    The important thing about this type of vulnerability is that the attacker is able to encode his XSS payload using UTF-7, and if you haven't specified a different character encoding on your page, a user's browser could interpret the UTF-7 payload and execute the attack script.

  • 相关阅读:
    Github进不去解决方法
    微信小程序中使用iconfont的方法
    curl实现SFTP上传下载文件
    curl实现SFTP上传下载文件
    curl不支持sftp的解决方法
    sscanf遇到回车换行认为字符串结束,怎样让它忽略这些回车换行继续搜索整个字符串?
    史上最全阿里 Java 面试题总结及答案
    VS Code的Error: Running the contributed command: ‘_workbench.downloadResource‘ failed解决
    云锵投资 2021 年 07 月简报
    看完段永平的100条思考,我终于悟出他为何这么牛…(转载)
  • 原文地址:https://www.cnblogs.com/chucklu/p/15407631.html
Copyright © 2011-2022 走看看