Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Current »

SQL Injection

Most Jasig code uses Hibernate or Hibernate backed JPA. Code which does not use these technologies should at least use prepared statements.

Cross-side Scripting (XSS)

Many Jasig porlets make use of Spring's escapeBody tag to perform HTML and JavaScript escaping.

The Manchester News Reader portlet uses OWASP Anti-Samy to clean dangerous tags from RSS feeds. This tool allows a developer to configurably strip HTML tags from proxied content.

Encryption of sensitive data

Most portlets should not need to store user passwords. However, for a portlet that does store potentially sensitive data, user data should be encrypted using some secure algorithm. Useful encryption resources might include Jasypt or Bouncy Castle.

Security resources

  • No labels