Cross-site scripting (XSS) vulnerability prevention in open-source web content management system documentation

Cross-site scripting (XSS) -haavoittuvuudet ovat olleet merkittävä uhka web-sovelluksille jo yli kahden vuosikymmenen ajan. XSS-haavoittuvuudet ovat säilyttäneet paikkansa yleisimmin havaittujen web-sovellushaavoittuvuuksien tilastoissa siitä huolimatta, että tarjolla on yhä kehittyneempiä teknologi...

Full description

Bibliographic Details
Main Author: Hanhijoki, Heikki
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Master's thesis
Language:eng
Published: 2023
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/86877
_version_ 1826225722460471296
author Hanhijoki, Heikki
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Hanhijoki, Heikki Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Hanhijoki, Heikki Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Hanhijoki, Heikki
datasource_str_mv jyx
description Cross-site scripting (XSS) -haavoittuvuudet ovat olleet merkittävä uhka web-sovelluksille jo yli kahden vuosikymmenen ajan. XSS-haavoittuvuudet ovat säilyttäneet paikkansa yleisimmin havaittujen web-sovellushaavoittuvuuksien tilastoissa siitä huolimatta, että tarjolla on yhä kehittyneempiä teknologioita web-sovellusten ja verkkosivujen kehittämiseen. Web-sisällönhallintajärjestelmät ovat merkittävässä roolissa modernien verkkosivujen julkaisussa, ja suuri osa Internetissä sijaitsevista sivustoista onkin luotu käyttäen kyseisiä järjestelmiä. Tässä pro gradu -tutkielmassa perehdyttiin siihen, kuinka XSS-haavoittuvuuksia käsitellään web-sisällönhallintajärjestelmien dokumentaatiossa, sekä kartoitettiin dokumentaatiossa esiintyviä keinoja puolustautua XSS-haavoittuvuuksia vastaan. Kirjallisuuskatsauksessa tunnistettiin joukko keinoja, joilla XSS-haavoittuvuuksia voidaan ehkäistä. Nämä jakautuivat lähdekoodin tasolla suoritettavaan käyttäjän syötteen erityyppiseen prosessointiin, sovellus- ja palvelinkonfiguraatioiden tuomaan lisäturvaan, sekä web-sovelluspalomuurin (WAF) käyttämiseen. Kirjallisuuskatsauksen perusteella sovelluskehittäjien keskuudessa esiintyy kuitenkin haasteita valikoida sovelluksiinsa sopivat puolustusmekanismit XSS:n kaltaisten haavoittuvuuksien ehkäisemiseksi. Tutkimustuloksissa havaittiin web-sisällönhallintajärjestelmien dokumentaation sisältävän ohjeistusta XSS-haavoittuvuuksien ehkäisystä sekä järjestelmien ydinsovellukselle että niihin kehitettäville lisäosille. Järjestelmädokumentaatiossa ehdotetuissa XSS-haavoittuvuuksien torjuntakeinoissa havaittiin keskityttävän enimmäkseen käyttäjän syötteen turvalliseen käsittelyyn erilaisin kirjallisuudessakin tunnistetuin metodein. Ohjeistuksen kattavuudessa ja johdonmukaisuudessa nähtiin kuitenkin vaihtelua sekä järjestelmien että puolustusmekanismien välillä. Cross-site scripting (XSS) vulnerabilities have been a significant threat for web applications for over two decades. XSS vulnerabilities have retained their position as one of the most commonly found web application vulnerabilities despite the availability of more advanced technologies for developing web applications and websites. Web content management systems have a significant role in the creation of modern websites, and a large amount of the sites on the Internet have been built using such systems. In this master’s thesis, the ways in which XSS vulnerabilities are addressed in the documentation of web content management systems were studied alongside mapping the methods in which such vulnerabilities can being defended from according to the documentation. A set of XSS prevention measures was recognized in a literature review. These were grouped into proper source code level handling of user input, additional security provided by software and server configurations and the use of a web application firewall (WAF). According to the literature review, software developers are still facing challenges with choosing suitable defenses against vulnerabilities such as cross-site scripting. From the results of the study, it was discovered that the documentation of web content management systems does give guidance on mitigating XSS vulnerabilities in the core of the systems and in their extensions. The recommended defenses against XSS vulnerabilities were found to be focused on the safe handling of user input with different methods. Varying coverage and coherence of the documented guidance was, however, discovered from the results in two distinct areas, between the systems and the XSS-preventive measures.
first_indexed 2023-05-11T20:02:08Z
format Pro gradu
fullrecord [{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Hanhijoki, Heikki", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-05-11T05:19:38Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-05-11T05:19:38Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/86877", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Cross-site scripting (XSS) -haavoittuvuudet ovat olleet merkitt\u00e4v\u00e4 uhka web-sovelluksille jo yli kahden vuosikymmenen ajan. XSS-haavoittuvuudet ovat s\u00e4ilytt\u00e4neet paikkansa yleisimmin havaittujen web-sovellushaavoittuvuuksien tilastoissa siit\u00e4 huolimatta, ett\u00e4 tarjolla on yh\u00e4 kehittyneempi\u00e4 teknologioita web-sovellusten ja verkkosivujen kehitt\u00e4miseen. Web-sis\u00e4ll\u00f6nhallintaj\u00e4rjestelm\u00e4t ovat merkitt\u00e4v\u00e4ss\u00e4 roolissa modernien verkkosivujen julkaisussa, ja suuri osa Internetiss\u00e4 sijaitsevista sivustoista onkin luotu k\u00e4ytt\u00e4en kyseisi\u00e4 j\u00e4rjestelmi\u00e4. T\u00e4ss\u00e4 pro gradu -tutkielmassa perehdyttiin siihen, kuinka XSS-haavoittuvuuksia k\u00e4sitell\u00e4\u00e4n web-sis\u00e4ll\u00f6nhallintaj\u00e4rjestelmien dokumentaatiossa, sek\u00e4 kartoitettiin dokumentaatiossa esiintyvi\u00e4 keinoja puolustautua XSS-haavoittuvuuksia vastaan. Kirjallisuuskatsauksessa tunnistettiin joukko keinoja, joilla XSS-haavoittuvuuksia voidaan ehk\u00e4ist\u00e4. N\u00e4m\u00e4 jakautuivat l\u00e4hdekoodin tasolla suoritettavaan k\u00e4ytt\u00e4j\u00e4n sy\u00f6tteen erityyppiseen prosessointiin, sovellus- ja palvelinkonfiguraatioiden tuomaan lis\u00e4turvaan, sek\u00e4 web-sovelluspalomuurin (WAF) k\u00e4ytt\u00e4miseen. Kirjallisuuskatsauksen perusteella sovelluskehitt\u00e4jien keskuudessa esiintyy kuitenkin haasteita valikoida sovelluksiinsa sopivat puolustusmekanismit XSS:n kaltaisten haavoittuvuuksien ehk\u00e4isemiseksi. Tutkimustuloksissa havaittiin web-sis\u00e4ll\u00f6nhallintaj\u00e4rjestelmien dokumentaation sis\u00e4lt\u00e4v\u00e4n ohjeistusta XSS-haavoittuvuuksien ehk\u00e4isyst\u00e4 sek\u00e4 j\u00e4rjestelmien ydinsovellukselle ett\u00e4 niihin kehitett\u00e4ville lis\u00e4osille. J\u00e4rjestelm\u00e4dokumentaatiossa ehdotetuissa XSS-haavoittuvuuksien torjuntakeinoissa havaittiin keskitytt\u00e4v\u00e4n enimm\u00e4kseen k\u00e4ytt\u00e4j\u00e4n sy\u00f6tteen turvalliseen k\u00e4sittelyyn erilaisin kirjallisuudessakin tunnistetuin metodein. Ohjeistuksen kattavuudessa ja johdonmukaisuudessa n\u00e4htiin kuitenkin vaihtelua sek\u00e4 j\u00e4rjestelmien ett\u00e4 puolustusmekanismien v\u00e4lill\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Cross-site scripting (XSS) vulnerabilities have been a significant threat for web applications for over two decades. XSS vulnerabilities have retained their position as one of the most commonly found web application vulnerabilities despite the availability of more advanced technologies for developing web applications and websites. Web content management systems have a significant role in the creation of modern websites, and a large amount of the sites on the Internet have been built using such systems. In this master\u2019s thesis, the ways in which XSS vulnerabilities are addressed in the documentation of web content management systems were studied alongside mapping the methods in which such vulnerabilities can being defended from according to the documentation. A set of XSS prevention measures was recognized in a literature review. These were grouped into proper source code level handling of user input, additional security provided by software and server configurations and the use of a web application firewall (WAF). According to the literature review, software developers are still facing challenges with choosing suitable defenses against vulnerabilities such as cross-site scripting. From the results of the study, it was discovered that the documentation of web content management systems does give guidance on mitigating XSS vulnerabilities in the core of the systems and in their extensions. The recommended defenses against XSS vulnerabilities were found to be focused on the safe handling of user input with different methods. Varying coverage and coherence of the documented guidance was, however, discovered from the results in two distinct areas, between the systems and the XSS-preventive measures.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-05-11T05:19:38Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-05-11T05:19:38Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "55", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": null, "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "xss", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "cms", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "wcms", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "cross-site scripting", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "content management systems", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Cross-site scripting (XSS) vulnerability prevention in open-source web content management system documentation", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202305112956", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "sis\u00e4ll\u00f6nhallinta", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "sovellusohjelmat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "haavoittuvuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "verkkosivustot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "WWW-sivut", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "content management", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "applications (computer programmes)", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "vulnerability", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "websites", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "web pages", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/collections/archival-workstation).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/kokoelmat/arkistotyoasema..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
id jyx.123456789_86877
language eng
last_indexed 2025-02-18T10:55:42Z
main_date 2023-01-01T00:00:00Z
main_date_str 2023
publishDate 2023
record_format qdc
source_str_mv jyx
spellingShingle Hanhijoki, Heikki Cross-site scripting (XSS) vulnerability prevention in open-source web content management system documentation xss cms wcms cross-site scripting content management systems Tietojärjestelmätiede Information Systems Science 601 sisällönhallinta sovellusohjelmat haavoittuvuus verkkosivustot WWW-sivut content management applications (computer programmes) vulnerability websites web pages
title Cross-site scripting (XSS) vulnerability prevention in open-source web content management system documentation
title_full Cross-site scripting (XSS) vulnerability prevention in open-source web content management system documentation
title_fullStr Cross-site scripting (XSS) vulnerability prevention in open-source web content management system documentation Cross-site scripting (XSS) vulnerability prevention in open-source web content management system documentation
title_full_unstemmed Cross-site scripting (XSS) vulnerability prevention in open-source web content management system documentation Cross-site scripting (XSS) vulnerability prevention in open-source web content management system documentation
title_short Cross-site scripting (XSS) vulnerability prevention in open-source web content management system documentation
title_sort cross site scripting xss vulnerability prevention in open source web content management system documentation
title_txtP Cross-site scripting (XSS) vulnerability prevention in open-source web content management system documentation
topic xss cms wcms cross-site scripting content management systems Tietojärjestelmätiede Information Systems Science 601 sisällönhallinta sovellusohjelmat haavoittuvuus verkkosivustot WWW-sivut content management applications (computer programmes) vulnerability websites web pages
topic_facet 601 Information Systems Science Tietojärjestelmätiede WWW-sivut applications (computer programmes) cms content management content management systems cross-site scripting haavoittuvuus sisällönhallinta sovellusohjelmat verkkosivustot vulnerability wcms web pages websites xss
url https://jyx.jyu.fi/handle/123456789/86877 http://www.urn.fi/URN:NBN:fi:jyu-202305112956
work_keys_str_mv AT hanhijokiheikki crosssitescriptingxssvulnerabilitypreventioninopensourcewebcontentmanagementsyst