<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"> 
<channel>
<title>CodeStore.net comments on "Hacking Domino: How to Filter Out XSS Attacks"</title>
<description>Replies to blog "Hacking Domino: How to Filter Out XSS Attacks" on codestore.net.</description>
<link>http://www.codestore.net/</link>
<lastBuildDate>Fri, 20 May 2011 07:54:36 -0500</lastBuildDate>
<atom:link href="http://www.codestore.net/store.nsf/blog.xml?Open=20080926" rel="self" type="application/rss+xml" />

<item>
	<title>Reply from Debbie S.</title>
	<pubDate>Fri, 20 May 2011 07:54:36 -0500</pubDate>
	<author>Debbie S.</author>
	<description><![CDATA[ 
		<p>I'm searching for resolutions to the ever present threat of XSS and have read this post.  An additional "booger" is when you have users that want to include angle brackets, especially with financial data or any other where comparison is made.  For example, "probably of this aware is &lt; 100%, but &gt;= 80%.  Please advise."</p>
		<p>This is a common type comment made in one of our cost type applications.  Unless the field is HTML, the &lt conversion won't work - it will take the literal '&lt' and display.</p>
		<p>Add the dual complexity of storing data and then in a view or elsewhere hyperlinking part of that data for a clickable URL to open it or whatever.  I would love to hear what the latest goings on are for this. </p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=B2C535F820CBA9F9862578960046E75B"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080926?OpenDocument#DOC_B2C535F8</link>
</item><item>
	<title>Reply from Jake Howlett</title>
	<pubDate>Tue, 10 Aug 2010 09:12:14 -0500</pubDate>
	<author>Jake Howlett</author>
	<description><![CDATA[ 
		<p>@Trevini. See the code example in the DEXT database which you can download from the Sandbox link above.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=A8FD3FD7CD4336C78625777B004E0603"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080926?OpenDocument#DOC_A8FD3FD7</link>
</item><item>
	<title>Reply from Triveni Ganta </title>
	<pubDate>Tue, 10 Aug 2010 08:27:32 -0500</pubDate>
	<author>Triveni Ganta </author>
	<description><![CDATA[ 
		<p>Hello Jake , </p>
		<p>Did u worked on how we can fix the XSS for domino ,if so can u please share the database to me </p>
		<p>@trivenigk@gmail.com</p>
		<p>thanks </p>
		<p>Triveni</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=6AF68F97326B21ED8625777B0049EEB9"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080926?OpenDocument#DOC_6AF68F97</link>
</item><item>
	<title>Reply from Howard Jacob</title>
	<pubDate>Mon, 26 Jul 2010 03:53:18 -0500</pubDate>
	<author>Howard Jacob</author>
	<description><![CDATA[ 
		<p>Hi all,</p>
		<p>I urgently need a xss filter in java library format for one of my projects. What do you recommend?</p>
		<p>In addition, is there any non-opensource type of xss filter which I can subscribe for service support?</p>
		<p>Thanks in advance.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=C3D025D3DE9935F88625776C0030D2FF"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080926?OpenDocument#DOC_C3D025D3</link>
</item><item>
	<title>Reply from Colin Law</title>
	<pubDate>Mon, 12 Jul 2010 08:24:18 -0500</pubDate>
	<author>Colin Law</author>
	<description><![CDATA[ 
		<p>Hi Jake,</p>
		<p>As you can see it's been some time since I have been back to your site. Please send me an email if you can and let me know what resources you have avail. for XSS. We have tried several things over the months including add-on software to no avail.</p>
		<p>Thanks.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=603F08A0605813D98625775E0049A2BB"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080926?OpenDocument#DOC_603F08A0</link>
</item><item>
	<title>Reply from Jake Howlett</title>
	<pubDate>Tue, 20 Oct 2009 00:58:06 -0500</pubDate>
	<author>Jake Howlett</author>
	<description><![CDATA[ 
		<p>I have just the Java agent you're looking for Colin. Drop me a line via the "Contact Us" link at the bottom and we can discuss.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=9D7472C744F3E5C3862576550020C8A3"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080926?OpenDocument#DOC_9D7472C7</link>
</item><item>
	<title>Reply from Colin</title>
	<pubDate>Mon, 19 Oct 2009 15:59:28 -0500</pubDate>
	<author>Colin</author>
	<description><![CDATA[ 
		<p>Hi All,</p>
		<p>We recently did an appscan as part of the security process at work and found a number of cross site scripting issues with our apps. Has anyone developed a strategy to reolve this issue within domino???</p>
		<p>Java agent or some type of coding method that does not require input validation on every field....</p>
		<p>Thanks,</p>
		<p>Colin</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=E64DB7E545F5F0678625765400734EF9"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080926?OpenDocument#DOC_E64DB7E5</link>
</item><item>
	<title>Reply from Jake Howlett</title>
	<pubDate>Wed, 15 Oct 2008 07:33:15 -0500</pubDate>
	<author>Jake Howlett</author>
	<description><![CDATA[ 
		<p>That's all very well madwhite but only works on fields where you don't want any HTML.What about fields where you do want to allow HTML to be entered? That's what I'm trying to deal with here with the tag whitelist.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=A905F58AD602A84D862574E30044F64D"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080926?OpenDocument#DOC_A905F58A</link>
</item><item>
	<title>Reply from madwhite hatter</title>
	<pubDate>Tue, 14 Oct 2008 14:20:05 -0500</pubDate>
	<author>madwhite hatter</author>
	<description><![CDATA[ 
		<p>I am using this simple bit of code, though it probaby needs more.</p>
		<p>Public Function HTMLEncodeXSS(dirtyString As String) As String</p>
		<p>Dim cleanString As Variant</p>
		<p>Dim vOriginal(0) As String</p>
		<p>Dim vFind(6) As String</p>
		<p>Dim vReplace(6) As String</p>
		<p>' scrub xss vulnerabilites</p>
		<p>vOriginal(0) = dirtyString</p>
		<p>vFind(0) = {&lt;}</p>
		<p>vFind(1) = {&gt;}</p>
		<p>vFind(2) = {%3c}</p>
		<p>vFind(3) = {%3e}</p>
		<p>vFind(4) = {"}</p>
		<p>vFind(5) = {'}</p>
		<p>vFind(6) = {\}</p>
		<p>vReplace(0) = {&amp;lt;}</p>
		<p>vReplace(1) = {&amp;gt;}</p>
		<p>vReplace(2) = {&amp;lt;}</p>
		<p>vReplace(3) = {&amp;gt;}</p>
		<p>vReplace(4) = {&amp;quot;;}</p>
		<p>vReplace(5) = {&amp;#039}</p>
		<p>vReplace(6) = {&amp;#092}</p>
		<p>cleanString = Replace(vOriginal, vFind, vReplace)</p>
		<p>HTMLEncodeXSS = cleanString(0)</p>
		<p>End Function</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=7DB15C54F5ED6FAD862574E2006A3522"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080926?OpenDocument#DOC_7DB15C54</link>
</item><item>
	<title>Reply from A De</title>
	<pubDate>Thu, 09 Oct 2008 21:32:42 -0500</pubDate>
	<author>A De</author>
	<description><![CDATA[ 
		<p>I've used the htmlawed PHP filter for XSS checks; it allows mixed white- and black-list approaches.</p>
		<p>See bioinformatics.org/phplabware/internal_utilities/htmLawed/index.php and bioinformatics.org/phplabware/internal_utilities/htmLawed/rsnake/RSnakeXSSTest.htm</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=FFB467D78053C892862574DE000DFAB2"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080926?OpenDocument#DOC_FFB467D7</link>
</item><item>
	<title>Reply from Per Henrik Lausten</title>
	<pubDate>Sat, 27 Sep 2008 13:18:43 -0500</pubDate>
	<author>Per Henrik Lausten</author>
	<description><![CDATA[ 
		<p>Jake, great work (as usual). I was looking for practical examples some time last year and did not really find anything useful. I needed the examples for a Domino web site with potential XSS vulnerabilities.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=991CFA7C5A4D6D0F862574D100649752"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080926?OpenDocument#DOC_991CFA7C</link>
</item><item>
	<title>Reply from Jake Howlett</title>
	<pubDate>Fri, 26 Sep 2008 14:17:25 -0500</pubDate>
	<author>Jake Howlett</author>
	<description><![CDATA[ 
		<p>Devin. Glad you like it. I agree the whitelist approach is best.</p>
		<p>mdmalph. According to the list at <a rel="nofollow" href="http://ha.ckers.org/xss.html">Link</a> it "works" in IE7 too.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=DBC76BB7BA07115E862574D00069F6CD"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080926?OpenDocument#DOC_DBC76BB7</link>
</item><item>
	<title>Reply from mdmadph</title>
	<pubDate>Fri, 26 Sep 2008 13:55:59 -0500</pubDate>
	<author>mdmadph</author>
	<description><![CDATA[ 
		<p>That one XSS attack you mention that works in the "style" param in IE -- is that just IE6?  Or is IE7 afflicted, too?</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=48152C3B0C6984CD862574D0006800A5"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080926?OpenDocument#DOC_48152C3B</link>
</item><item>
	<title>Reply from Akash D.</title>
	<pubDate>Fri, 26 Sep 2008 11:56:57 -0500</pubDate>
	<author>Akash D.</author>
	<description><![CDATA[ 
		<p>Will you run into same issue if the login page is from Juniper and then Juniper can authenticate with Domino?</p>
		<p>We use Juniper for external client authentication, juniper in turn will authenticate with domino server. Login in successfully the user is directed to home page.</p>
		<p>Thanks</p>
		<p>Akash</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=E3CF516D85E04804862574D0005D1AD1"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080926?OpenDocument#DOC_E3CF516D</link>
</item><item>
	<title>Reply from Devin Olson</title>
	<pubDate>Fri, 26 Sep 2008 11:54:34 -0500</pubDate>
	<author>Devin Olson</author>
	<description><![CDATA[ 
		<p>Hey there Jake.  I've followed this entire series (lurk mode); and I've very much enjoyed it.</p>
		<p>I was doing some testing, and even simple things like onmouseover="my malicious script" can get through without careful checking.</p>
		<p>For normal (where HTML is not allowed) fields, the following input translation formula works very well:</p>
		<p>@ReplaceSubstring(@Trim(@ThisValue); "&lt;":"&gt;"; "&amp;lt;":"&amp;gt;");</p>
		<p>For fields where HTML IS allowed, I think the blacklist approach would ultimately prove unworkable.  I think a whitelist approach is a much better idea.</p>
		<p>Anyway, thanks for posting this very helpful series!</p>
		<p>-Devin.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=BD93EA3A192269E8862574D0005CE2CF"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080926?OpenDocument#DOC_BD93EA3A</link>
</item>

</channel>
</rss> 
