Re: WebObjects and HTML injection

2010-07-22 Thread Dov Rosenberg
Check out http://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API They have a very good Java based implementation of security code that you can integrate with your java based project to help you sanitize your user/externally provided data. It is not sufficient to check for

Re: WebObjects and HTML injection

2010-07-22 Thread Lachlan Deck
On 22/07/2010, at 9:28 PM, Patrick Middleton wrote: > Some of our customers are commissioning penetration testing reports, which > are flagging vulnerabilities in our WebObjects applications. The problem > reported is with URLs such as > .../wa/MyDirectAction?wosid=XYZ%22%3E%3Cscript%3Ealert%2

Re: WebObjects and HTML injection

2010-07-22 Thread Anjo Krank
I don't follow: *is* this an actual problem with the default coding style? IMO, you wouldn't ever say "oh noez! your session $ID" is no longer valid! but I'll use it anyway." What *should* happen is that WO gives you a new page when the instance doesn't find the existing session (SessionExpire

Re: WebObjects and HTML injection

2010-07-22 Thread George Domurot
Wouldn't a simple check on hasSession do the trick? No session = no action = pageWithName(OhNoYouDidNot) -G On Jul 22, 2010, at 9:40 AM, Patrick Middleton wrote: > > On 22 Jul 2010, at 12:49, Anjo Krank wrote: > >> Why would you "preserve" the session id when it's no longer valid? >> >> Ch

Re: WebObjects and HTML injection

2010-07-22 Thread Patrick Middleton
On 22 Jul 2010, at 12:49, Anjo Krank wrote: Why would you "preserve" the session id when it's no longer valid? Cheers, Anjo Am 22.07.2010 um 13:28 schrieb Patrick Middleton: in order to sanitize inputs -- mostly by removing anything containing the likes of ' Preserve the session id whe

Re: WebObjects and HTML injection

2010-07-22 Thread Anjo Krank
Why would you "preserve" the session id when it's no longer valid? Cheers, Anjo Am 22.07.2010 um 13:28 schrieb Patrick Middleton: > in order to sanitize inputs -- mostly by removing anything containing the > likes of 'http://lists.apple.com/mailman/options/webobjects-dev/archive%40mail-archiv

WebObjects and HTML injection

2010-07-22 Thread Patrick Middleton
Hi folks! Some of our customers are commissioning penetration testing reports, which are flagging vulnerabilities in our WebObjects applications. The problem reported is with URLs such as .../wa/MyDirectAction? wosid=XYZ%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E , direct actions that