Previous Topic: Securing Connections Across the Federated EnvironmentNext Topic: Application Integration at the Relying Party


Protecting a Federated Network Against Cross-Site Scripting

A Cross Site Scripting (XSS) attack can occur when an application displays input text from a browser (typically, data from a post or data from query parameters on a URL) without filtering for characters that can form an executable script when displayed at the browser. The display of these characters can lead to an unwanted script being executed on the browser.

CA SiteMinder® Federation Standalone provides several JSPs for use with federation functionality. These JSPs check characters in a request to be sure that unsafe information in the output stream is not displayed in the browser.

When CA SiteMinder® Federation Standalone receives a request, the following JSPs scan the decoded values for cross-site scripting characters:

The pages scan the request for the following characters:

Character

Description

<

left angle bracket

>

right angle bracket

single quotation mark

double quotation mark

%

percent sign

;

semi-colon

(

open (left) parenthesis

)

closed (right) parenthesis

&

ampersand

+

plus sign

Each CA SiteMinder® Federation Standalone-provided JSP contains a variable that defines the characters to scan. Modify these JSPs to expand the character set.