XSS - I'm overthinking this..
Hello, all,
I'm overly concerned about XSS attempts on my sites. I cannot seem to find a decent solution.
I know that as far as using URL parameters on server-side processing, you should use canonicalize() to reduce encoded script to what a potential bad actor intended to run on the server, and sanitize from there. Apparently, whitelisting is a very effective method. But, what about when whitelisting isn't an option (like, for example, input into a database, or used as a conditional for database processing)?
Also, what about client-side effects? I've seen where URL parameters can be used to inject JavaScript code into a page. Now, I know that EncodeForURL() and others should be used, but how can one manipulate the URL so that XSS would be rendered useless?? Without using a redirect like CFLOCATION??
V/r,
^_^
PS: It's the day before Thanksgiving Day, in the USA, so I won't be on much between now and Monday. Happy Thanksgiving Day to all American users!
