From a1b265c318dbda4a213cec930785b81e4c0f7d2b Mon Sep 17 00:00:00 2001 From: elmot Date: Fri, 25 Sep 2015 16:40:44 +0300 Subject: Framework documentation IN Change-Id: I767477c1fc3745f9e1f58075fe30c9ac8da63581 --- documentation/advanced/advanced-security.asciidoc | 56 +++++++++++++++++++++++ 1 file changed, 56 insertions(+) create mode 100644 documentation/advanced/advanced-security.asciidoc (limited to 'documentation/advanced/advanced-security.asciidoc') diff --git a/documentation/advanced/advanced-security.asciidoc b/documentation/advanced/advanced-security.asciidoc new file mode 100644 index 0000000000..d3b0a5249c --- /dev/null +++ b/documentation/advanced/advanced-security.asciidoc @@ -0,0 +1,56 @@ +--- +title: Common Security Issues +order: 8 +layout: page +--- + +[[advanced.security]] += Common Security Issues + +[[advanced.security.sanitizing]] +== Sanitizing User Input to Prevent Cross-Site Scripting + +You can put raw HTML content in many components, such as the [classname]#Label# +and [classname]#CustomLayout#, as well as in tooltips and notifications. In such +cases, you should make sure that if the content has any possibility to come from +user input, you must make sure that the content is safe before displaying it. +Otherwise, a malicious user can easily make a +link:http://en.wikipedia.org/wiki/Cross-site_scripting[cross-site scripting +attack] by injecting offensive JavaScript code in such components. See other +sources for more information about cross-site scripting. + +Offensive code can easily be injected with [literal]#++