logo
Apache Lounge
Webmasters

 

About Forum Index Downloads Search Register Log in RSS X


Keep Server Online

If you find the Apache Lounge, the downloads and overall help useful, please express your satisfaction with a donation.

or

Bitcoin

A donation makes a contribution towards the costs, the time and effort that's going in this site and building.

Thank You! Steffen

Your donations will help to keep this site alive and well, and continuing building binaries. Apache Lounge is not sponsored.
Post new topic   Forum Index -> Apache View previous topic :: View next topic
Reply to topic   Topic: XSS Vulnerability
Author
lostapachepilot



Joined: 28 Apr 2017
Posts: 1

PostPosted: Sun 30 Apr '17 17:07    Post subject: XSS Vulnerability Reply with quote

Hello All,

Looking for some help to determine if I can configure Apache 2.0.59 to address a couple Cross Site Scripting (XSS) vulnerabilities. I'm not able to upgrade to a later version, so I'm trying to understand if there is functionality within this version to address the XSS issue.


I have 2 specific issues:

1. Validating input (whitelisting acceptable characters)

2. Sanitizing or encoding output (For instance, the character < ould be encoded as &lt; which would be displayed by the browser as the “less-than” character instead of being interpreted as the start
of an HTML tag.)


I am not an experienced apache administrator, so any help would be most appreciated.

Thanks.
Back to top
glsmith
Moderator


Joined: 16 Oct 2007
Posts: 2268
Location: Sun Diego, USA

PostPosted: Wed 03 May '17 0:55    Post subject: Reply with quote

No, other than adding the XSS header to your config.

Header always set X-Xss-Protection "1; mode=block"

Both 1 & 2 are tragically the responsibility of what is accepting user input like wordpress, forum software, etc.
Back to top
C0nw0nk



Joined: 07 Oct 2013
Posts: 241
Location: United Kingdom, London

PostPosted: Thu 04 May '17 21:35    Post subject: Reply with quote

I think you should look at a WAF (Web application Firewall)

Insert some rules to prevent XSS attacks.

ModSecurity i think is decent for Apache in this.

https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project

While i think you should update and fix your web application itself to fix the known XSS exploits that you are aware of (if any).

The decent alternative for any potential XSS attacks or people trying to test to find them is to get a WAF since it covers you against the exploits that may crop up in the future and unknown ones.

Better to be safe than sorry. Just because a exploit does not exist today doe snot mean tomorrow you will be so lucky. Plan ahead and protect yourself from what could happen to your site later on.
Back to top


Reply to topic   Topic: XSS Vulnerability View previous topic :: View next topic
Post new topic   Forum Index -> Apache