Tim Moores wrote:I think the better approach is to debug why it doesn't work.
Tim Moores wrote:I think the better approach is to debug why it doesn't work. So: How isn't it working? Show us the JSP, the HTML it generates, and describe what exactly is happening when it runs.
The best ideas are the crazy ones. If you have a crazy idea and it works, it's really valuable.—Kent Beck
How to Ask Questions | How to Answer Questions | Format Your Code
Rithanya Laxmi wrote:<p><a id="customerDataPage" class="btn-link" href="/xxx/customer/customerData.jsp?isSOCKCustomer=${customerRequest}">XXXX</a></p>
The best ideas are the crazy ones. If you have a crazy idea and it works, it's really valuable.—Kent Beck
How to Ask Questions | How to Answer Questions | Format Your Code
The best ideas are the crazy ones. If you have a crazy idea and it works, it's really valuable.—Kent Beck
How to Ask Questions | How to Answer Questions | Format Your Code
Junilu Lacar wrote: An attacker will already know that your implementation uses the name "customerRequest
The best ideas are the crazy ones. If you have a crazy idea and it works, it's really valuable.—Kent Beck
How to Ask Questions | How to Answer Questions | Format Your Code
Junilu Lacar wrote:It's still another piece of information that I, as an attacker, can use when I'm probing around for a vulnerability.
The best ideas are the crazy ones. If you have a crazy idea and it works, it's really valuable.—Kent Beck
How to Ask Questions | How to Answer Questions | Format Your Code
Tim Moores wrote:I think the better approach is to debug why it doesn't work. So: How isn't it working? Show us the JSP, the HTML it generates, and describe what exactly is happening when it runs.
The best ideas are the crazy ones. If you have a crazy idea and it works, it's really valuable.—Kent Beck
How to Ask Questions | How to Answer Questions | Format Your Code
Rithanya Laxmi wrote:I want to handle this from client side/JSP.
Rithanya Laxmi wrote:I want to handle this from client side/JSP. I was going through the below URL , there it is mentioned to use the <c:out> for sanitization.
https://hdivsecurity.com/owasp-xss
Cross-site Scripting (XSS) wrote:It is important to note that both preventions are necessary, HTML Escape and Input Validation.
Dave Tolls wrote:cout has an escapeXml attribute that (I believe) would need to be set to true to actually escape the HTML.
You save more money with a clothesline than dozens of light bulb purchases. Tiny ad:
Java file APIs (DOC, XLS, PDF, and many more)
https://products.aspose.com/total/java
|