Checking for cross-site scripting vulnerabilities in Perl web applications
Posted
by
David Scholefield
on Programmers
See other posts from Programmers
or by David Scholefield
Published on 2013-08-31T16:35:50Z
Indexed on
2013/10/25
16:11 UTC
Read the original article
Hit count: 361
I'm putting together some notes for a dev team on how to write secure Perl code - especially taking into account the current OWASP top 10 web application vulnerabilities. For cross-site scripting I've included information on ensuring that all output to the browser is checked and escaped where necessary, but I'm looking for more automated mechanisms that would mean a developer doesn't have to think about every output statement and, potentially, miss one. Perl's 'taint' function sounds like it should be a help because it distrusts all user input, but it doesn't complain on tainted data being output to the browser. Apart from checking all output statements individually (probably by calling a generic sanitizing function) does anyone have any ideas on how Perl can help with this with existing libraries or techniques?
© Programmers or respective owner