Previous Topic: IIS 6.0 Servers and BadURLChars Settings

Next Topic: Specify Bad Query Characters

Specify Bad Form Characters

The following characters are commonly used in cross-site scripting attacks:

If you want to use scripting code for presenting forms to a user during an authentication challenge, configure the Web Agent encode any of the previous characters as literal HTML before sending them to an HTML form with the following parameter:

BadFormChars

Specifies the characters that the Web Agent encodes as literal HTML characters before using them as output on a form. Only directive substitutions are encoded as raw HTML—the source lines in the form template (for example the login.fcc template) are unchanged. Keeping the source lines unchanged prevents dynamic data containing scripting code from being sent back to the browser as data in the form.

Default: Disabled (no literal encoding)

Example: <, >, &, %22

Limits:

To set the BadFormChars parameter

  1. Enable the BadFormChars parameter by removing the # character in front of it.

    The BadFormChars parameter is enabled with all of the previous characters included.

  2. (Optional) Remove any characters that you do not want to use from the list. Verify that the remaining characters are separated from one another with commas.