Child pages
  • Security: Cross-site Scripting (XSS)

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Only in cases where the source of the html can be fully trusted, an element can should be configured to disable santizingsanitizing.

This is done via the UI_PROPERTY.TRUST_DATA_AS_HTML client property on an element:

Code Block
elements.usernameLabel.putClientProperty(APP_UI_PROPERTY.TRUST_DATA_AS_HTML, true);

When this property is set on an element, data from its dataProvider will be trusted and not sanitized.

Alternatively, sanitizing of data can be turned off for the entire running client by applying the same property on the application node:

Code Block
application.putClientProperty(APP_UI_PROPERTY.TRUST_DATA_AS_HTML, true);

Using this at application level is highly discouraged, your system may be vulnerable to XSS attacks.