From 2af72ba9636bec70046394c41744f89ce4572e35 Mon Sep 17 00:00:00 2001 From: Ilia Motornyi Date: Thu, 3 Dec 2015 14:59:05 +0000 Subject: Revert "Merge branch 'documentation'" This reverts commit f6874bde3d945c8b2d1b5c17ab50e2d0f1f8ff00. Change-Id: I67ee1c30ba3e3bcc3c43a1dd2e73a822791514bf --- documentation/advanced/advanced-security.asciidoc | 56 ----------------------- 1 file changed, 56 deletions(-) delete mode 100644 documentation/advanced/advanced-security.asciidoc (limited to 'documentation/advanced/advanced-security.asciidoc') diff --git a/documentation/advanced/advanced-security.asciidoc b/documentation/advanced/advanced-security.asciidoc deleted file mode 100644 index d3b0a5249c..0000000000 --- a/documentation/advanced/advanced-security.asciidoc +++ /dev/null @@ -1,56 +0,0 @@ ---- -title: Common Security Issues -order: 8 -layout: page ---- - -[[advanced.security]] -= Common Security Issues - -[[advanced.security.sanitizing]] -== Sanitizing User Input to Prevent Cross-Site Scripting - -You can put raw HTML content in many components, such as the [classname]#Label# -and [classname]#CustomLayout#, as well as in tooltips and notifications. In such -cases, you should make sure that if the content has any possibility to come from -user input, you must make sure that the content is safe before displaying it. -Otherwise, a malicious user can easily make a -link:http://en.wikipedia.org/wiki/Cross-site_scripting[cross-site scripting -attack] by injecting offensive JavaScript code in such components. See other -sources for more information about cross-site scripting. - -Offensive code can easily be injected with [literal]#++