The following characters are commonly used in cross-site scripting attacks:
If you want to use scripting code for presenting forms to a user during an authentication challenge, configure the Web Agent encode any of the previous characters as literal HTML before sending them to an HTML form with the following parameter:
Specifies the characters that the Web Agent encodes as literal HTML characters before using them as output on a form. Only directive substitutions are encoded as raw HTML—the source lines in the form template (for example the login.fcc template) are unchanged. Keeping the source lines unchanged prevents dynamic data containing scripting code from being sent back to the browser as data in the form.
Default: Disabled (no literal encoding)
Example: <, >, &, %22
Limits:
To set the BadFormChars parameter
The BadFormChars parameter is enabled with all of the previous characters included.
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |