Scanners at $dayjob (and reports on security@) frequently report that
built-in error documents suffer from non-xss HTML injection from the
request URL.

Here are a few options to silencing these scans/reports:

[ ] remove the URL's
[ ] truncate them
[ ] put them in HTML comments
[ ] use CSS to make some <spoiler>-like tag
[ ] use CSS to make the URL non-selectable/copyable
[ ] base64 encode the URL's and surround with some text that says its
only useful for the webserver administrator.
[ ] use r->the_request or r->unparsed_uri or re-encode the decoded URI
so spaces can't be used.

I was initially leaning towards the CSS options, but after tinkering
with a spoiler tag you still have something tempting to copy/paste.

Now I am thinking base64  + html comments is the best. This does make
screenshots of error documents kind of useless, but we still have
access logs.

We could also make all of this configurable so whatever obfuscates the
URL could provide different methods.

Any other ideas / preferences?

-- 
Eric Covener
cove...@gmail.com

Reply via email to