[html5] r6347 - [e] (0) Recommend against blacklists.
whatwg at whatwg.org
whatwg at whatwg.org
Tue Aug 2 15:00:29 PDT 2011
Author: ianh
Date: 2011-08-02 15:00:27 -0700 (Tue, 02 Aug 2011)
New Revision: 6347
Modified:
complete.html
index
source
Log:
[e] (0) Recommend against blacklists.
Modified: complete.html
===================================================================
--- complete.html 2011-08-02 21:47:26 UTC (rev 6346)
+++ complete.html 2011-08-02 22:00:27 UTC (rev 6347)
@@ -2174,6 +2174,13 @@
process, to the catastrophic, such as deleting all data in the
server.</p>
+ <p>When writing filters to validate user input, it is imperative
+ that filters always be whitelist-based, allowing known-safe
+ constructs and disallowing all other input. Blacklist-based
+ filters that disallow known-bad inputs and allow everything else
+ are not secure, as not everything that is bad is yet known (for
+ example, because it might be invented in the future).</p>
+
<div class=example>
<p>For example, suppose a page looked at its URL's query string
Modified: index
===================================================================
--- index 2011-08-02 21:47:26 UTC (rev 6346)
+++ index 2011-08-02 22:00:27 UTC (rev 6347)
@@ -2076,6 +2076,13 @@
process, to the catastrophic, such as deleting all data in the
server.</p>
+ <p>When writing filters to validate user input, it is imperative
+ that filters always be whitelist-based, allowing known-safe
+ constructs and disallowing all other input. Blacklist-based
+ filters that disallow known-bad inputs and allow everything else
+ are not secure, as not everything that is bad is yet known (for
+ example, because it might be invented in the future).</p>
+
<div class=example>
<p>For example, suppose a page looked at its URL's query string
Modified: source
===================================================================
--- source 2011-08-02 21:47:26 UTC (rev 6346)
+++ source 2011-08-02 22:00:27 UTC (rev 6347)
@@ -969,6 +969,13 @@
process, to the catastrophic, such as deleting all data in the
server.</p>
+ <p>When writing filters to validate user input, it is imperative
+ that filters always be whitelist-based, allowing known-safe
+ constructs and disallowing all other input. Blacklist-based
+ filters that disallow known-bad inputs and allow everything else
+ are not secure, as not everything that is bad is yet known (for
+ example, because it might be invented in the future).</p>
+
<div class="example">
<p>For example, suppose a page looked at its URL's query string
More information about the Commit-Watchers
mailing list