Previous Topic: Securing Connections Across the Federated Environment

Next Topic: Creating Affiliate Domains

Protecting Against Cross-Site Scripting

A Cross Site Scripting (XSS) attack can occur when an application displays input text from a browser without filtering for characters that can form an executable script. The input text is typically data from a post or data from query parameters on a URL. The display of these characters in a browser can lead to an unwanted script being executed on the browser.

SOA Security Manager provides several JSPs for use with SOA Security Manager federation functionality. These JSPs check characters in a request to be sure that unsafe information in the output stream is not displayed in the browser.

When SOA Security Manager receives a federation request, the following JSPs scan the decoded values for cross-site scripting characters:

The pages scan the request for the following characters:

Character

Description

<

left angle bracket

>

right angle bracket

single quotation mark

double quotation mark

%

percent sign

;

semi-colon

(

open (left) parenthesis

)

closed (right) parenthesis

&

ampersand

+

plus sign

Each SOA Security Manager-provided JSP contains a variable that defines the characters to scan. You can modify these JSPs to expand the character set.