[Esapi-user] Do we need to enable canonicalization in Java?
daniel.zenz at lotterien.at
Fri Nov 7 11:32:19 UTC 2014
as far as I understood the question from Eduardo, he wants to know if Java (application server) provides the data from the request already canonicalized, or if it is necessary to canonicalize it “by hand”.
My experience is that, in a Java EE environment, it is not needed to do the canonicalization, because it is already done by the application server.
But this is one of the questions I ask myself very often, if it is really not needed in Java EE. So I am not 100% sure about that.
Von: esapi-user-bounces at lists.owasp.org [mailto:esapi-user-bounces at lists.owasp.org] Im Auftrag von Jeff Williams
Gesendet: Montag, 03. November 2014 21:05
An: Eduardo Macarron; esapi-user at lists.owasp.org
Betreff: Re: [Esapi-user] Do we need to enable canonicalization in Java?
I’m not sure if anyone answered your question. For some background, read this article, “The Only Two Things Every Developer Needs to Know About Injection<http://www.darkreading.com/application-security/the-only-2-things-every-developer-needs-to-know-about-injection/a/d-id/1269091>.”
I didn’t get into canonicalization in the article, but it’s critically important. The reason is that attacks can be encoded into many forms. To prove the point, I once encoded an attack in Morse Code<http://www.zdnet.com/blog/security/morse-code-rickroll-0-day-no-seriously-i-mean-it/1071>.
The point is that encoded data might easily pass your validation mechanism, only to be transformed later by a decoder into an attack. The solution is to canonicalize first, then validate, and use the canonical form everywhere downstream.
If you’re using ESAPI.isValid* methods, it does canonicalization under the hood. I recommend using getValid* so that you can use the canonical form downstream.
From: esapi-user-bounces at lists.owasp.org<mailto:esapi-user-bounces at lists.owasp.org> [mailto:esapi-user-bounces at lists.owasp.org] On Behalf Of Eduardo Macarron
Sent: Monday, October 27, 2014 2:17 AM
To: esapi-user at lists.owasp.org<mailto:esapi-user at lists.owasp.org>
Subject: [Esapi-user] Do we need to enable canonicalization in Java?
Hello everybody in the list.
We are adding ESAPI 2.x to a Spring MVC+Spring Security+MyBatis application.
We only want ESAPI for XSS protection (Canonicalize, Validate, Encode). Not for SQL injection, authentication or authorization.
To implement the XSS protection we are validating inputs with calls to Validator.isValid* methods.
We are not encoding output with ESAPI because input data is supposed to be trusted after validation and also because Spring does some encoding by default.
My question is about canonicalization. Sorry if this same question has been made millions of times. I have not been able to find a good reply to it yet.
Do we need canonicalization?
I can not understand how an encoded input can be a threat. Can anybody point to a sample of an attack using encoded data in Java?
Österreichische Lotterien Ges.m.b.H., Rennweg 44, A-1038 Wien
FN 54472 g, Handelsgericht Wien, DVR-Nr.: 0476706, UID ATU 15666508
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Esapi-user