Partager via


Microsoft Anti-Cross Site Scripting Library V1.0 Available

I like this class library because it looks for "good things" and not "bad things."  

The most common method of mitigating XSS issues is to use functions like HtmlEncode that look for "bad things" and escape them. But this library does the right thing - it looks only for good things (a very small set), and escapes everything else.

There are only two methods:

AntiXSSLibrary.HtlmEncode and AntiXSSLibrary.UrlEncode

Very cool... and very simple.

Comments

  • Anonymous
    February 27, 2006
    The link does not give any details on what the library is doing exactly. How is that different from the HtmlEncode and UrlEncode that are built-in ASP.NET?
  • Anonymous
    March 06, 2006
    Awesome.  Thanks for sharing, we might need something like this.
  • Anonymous
    March 06, 2006
    Michael, ironically the install demands .NET 1.0 (!) while the download description says "Current MSI includes only 2.0 binaries".

    Do you think someone can repackage the distro not to demand an old version of .NET? :)

    Pardon my ignorance, but since when does Windows Installer expect a certain version of .NET?
  • Anonymous
    March 06, 2006
    I could not download the library,
    Could you please add another working link,
    Thanks for your support,
  • Anonymous
    March 07, 2006
    Apparently I can't download it. broken link?
  • Anonymous
    March 10, 2006
    The comment has been removed
  • Anonymous
    March 10, 2006
    The comment has been removed
  • Anonymous
    March 11, 2006
    Thanks Michael for the post.  If you had trouble downloading, please try again, it should work fine.  For those who had questions, please watch our blog (http://blogs.msdn.com/ace_team)We'll be posting details on this library there in the next day or two along with some additional details.  

    Ahmad [MSFT]
  • Anonymous
    March 13, 2006
    The comment has been removed
  • Anonymous
    March 13, 2006
    to be honest, "does it the way it should be done securely" is probably more accurate!

    One of the course lessons about security is never "looking for bad things" and you could argue that's what HttpUtility does. It looks for bad things and escapes them. the Anti-Xss code looks only for good things, and escapes everything but the known good things.
  • Anonymous
    March 15, 2006
    Everyone thinking of using this tool in a production or non-demo environment needs to read the EULA. To quote Section 1:

    You may install and use any number of copies of the software on your devices.  You may use the software only to demonstrate and internally evaluate it.

    You may not use the software in a live operating environment unless Microsoft permits you to do so under another agreement.


  • Anonymous
    March 20, 2006
    Regarding the EULA, that's the standard EULA we use for an 'unsupported' tool -- so that might bewhere the confusion is coming from.  That said, we'll still field questions about the tool if you email acetools@microsoft.com. Thanks,

    Kevin
  • Anonymous
    March 24, 2006

    Interesting. Actually, there was a configuration specific issue with htmlencode detected (August 2004):

    http://it-project.ru/andir/docs/aspxvuln/aspxvuln.en.xml

    Probably not well known, and mostly ignored, due to its specific configuration to be exploitable. Still, it shows the advantages of  the new toolkit approach.


  • Anonymous
    April 18, 2006
    Time for another ASP.NET roundup post...so here goes:

    The first one is a biggie...the ASP.NET team...
  • Anonymous
    November 20, 2006
    Earlier this year I wrote a blog post about Anti-XSS Library v1.0. Well, it's been updated with new methods