This page describes the mechanisms in Liferay to escape characters.
All the escape methods are designed to prevent XSS attacks and follows OWASP's recommendations for escaping. They can be found in the class HtmlUtil:
Functions:
____________________________________________________________________
All the escape methods are designed to prevent XSS attacks and follows OWASP's recommendations for escaping. They can be found in the class HtmlUtil:
Functions:
____________________________________________________________________
- HtmlUtil.escape() is for inserting untrusted data into an HTML element
- HtmlUtil.escapeHREF() is for inserting full URLs into the href attribute
- HtmlUtil.escapeURL() is for inserting untrusted data into URL parameter values
- HtmlUtil.escapeAttribute() is for inserting untrusted data into HTML element attribute values
- HtmlUtil.escapeCSS() is for inserting untrusted data into CSS property values
- HtmlUtil.escapeJS() is for inserting untrusted data into JavaScript strings
Rule 1 : Don't escape before persisting
There's a few reason why it's generally a bad idea to escape the data before it's persisted.- It increases the size of the data that must be stored
- You may need the original at some point in the future. If the data is escaped already, it'll be very difficult to get back the original.
Rule 2 : Escape at the last minute
Escaping should be done at the last minute. This avoids situations where the data is escaped before all the business logic is done. Practically, this means that most of the escaping should be done in .jsp files and not in .java files.Pattern 1 : LanguageUtil
The values in a Language.properties file may contain HTML elements and they are always safe. So, you should avoidHtmlUtil.escape(LanguageUtil.format(pageContext, "entries-with-tag-x", tagName))
and instead doLanguageUtil.format(pageContext, "entries-with-tag-x", HtmlUtil.escape(tagName))
No comments:
Post a Comment