Expand my Community achievements bar.

Don’t miss the AEM Skill Exchange in SF on Nov 14—hear from industry leaders, learn best practices, and enhance your AEM strategy with practical tips.

How to Protect AEM Websites from Cross-Site Scripting(XSS) | AEM Community Blog Seeding

Avatar

Administrator

BlogImage.jpg

How to Protect AEM Websites from Cross-Site Scripting(XSS) by Tech Forum

Abstract

Video: https://youtu.be/9GF3nYfoiK0

Cross-site scripting (XSS) allows attackers to inject code into web pages viewed by other users. This security vulnerability can be exploited by malicious web users to bypass access controls.

The actual attack occurs when the victim visits the web page or web application that executes the malicious code. The web page or web application becomes a vehicle to deliver the malicious script to the user’s browser.

Most of the time the malicious scripts are injected through

URL Parameters
FORM Parameters (GET and POST parameters)
Cookies
HTTP Headers

AEM applies the principle of filtering all user-supplied content upon output. The XSS protection mechanism provided by AEM is based on the AntiSamy Java Library provided by OWASP.

AntiSamy is an HTML, CSS, and JavaScript filter for Java that sanitizes user input based on a policy file.

Read Full Blog

How to Protect AEM Websites from Cross-Site Scripting(XSS)

Q&A

Please use this thread to ask the related questions.



Kautuk Sahni
Topics

Topics help categorize Community content and increase your ability to discover relevant content.

0 Replies