I wrote a webmail app once, where cross site scripting was a concern for html 
email messages.

I parsed the html message to a dom with htmlcleaner, then removed all <script 
...> tags , onXXX="..." attributes, and href="javascript:..." links before 
displaying the message. Perhaps it's over the top for your scenario, but it's a 
safe solution against XSS. :)

http://htmlcleaner.sourceforge.net/

Martin

On Fri, 23 May 2008 17:45:02 +0200, Peter Stavrinides <[EMAIL PROTECTED]> wrote:

> Thanks Howard, we will give it a try... this is more appropriate for our 
> requirements!
>
> cheers,
> Peter
> ----- Original Message -----
> From: "Howard Lewis Ship" <[EMAIL PROTECTED]>
> To: "Tapestry users" <users@tapestry.apache.org>
> Sent: Friday, 23 May, 2008 6:20:21 PM GMT +02:00 Athens, Beirut, Bucharest, 
> Istanbul
> Subject: Re: Tapestry 5 validation for cross site scripting
>
> Using the "parseClient" event, you could intercept the string
> submitted by the user and do the filtering before the value is
> assigned to a page property.
>
> You could also design a translator for this purpose.
>
> On Fri, May 23, 2008 at 3:41 AM, Peter Stavrinides
> <[EMAIL PROTECTED]> wrote:
>> Hi All
>>
>> Can anyone offer suggestions on best practice for handling validation 
>> specifically for preventing cross site scripting and code injection etc in 
>> Tapestry applications. Is there anything built into the framework I could 
>> use... if not what is the best way to plug something of my own in. What I 
>> mean is should I write my own validator/s and use them in every form 
>> component?, or is there a more elegant way I should know about, say a filter 
>> or something? Does anyone use a 3rd party library written specifically for 
>> this?
>>
>> Thanks
>> Peter

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to