Filtering or sanitization is the predominant mechanismin today’s applications to defend against cross-site scripting
(XSS) attacks. XSS sanitization can be difficult to get right asit ties in closely with the parsing behavior of the browser. This paper explains some of the subtleties of ensuring correct sanitization,as well as common pitfalls. We study several emerging web application frameworks including those presently used for development of commercial web applications. We evaluate how effective these frameworks are in guarding against the common pitfalls of sanitization. We find that while some web frameworks safeguard against the empirically relevant use cases, most do not. In addition, some of the security features in present web frameworks provide a false sense of security.
Download PDF: http://www.eecs.berkeley.edu