Linux 软件免费装
Banner图

Prevent XSS Vulnerability

开发者 sasiddiqui
更新时间 2021年7月14日 23:12
PHP版本: 3.5 及以上
WordPress版本: 5.7
版权: GPLv3
版权网址: 版权信息

标签

security vulnerability attack xss cross-site scripting self-xss

下载

0.2 0.2.1 0.3.0 0.3.1 0.3.2 0.3.3 0.3.4 0.3.5 1.0.0 0.1 2.0.0

详情介绍:

This plugin provides the functionality for Reflected XSS and Self-XSS. For Reflected XSS, it checks the URL and redirects it if you enabled the Enable Blocking option and URL contains any Vulnerable code in it. It only block some parameters which are not allowed in URL and shown Block Parameters section. You can skip some of the parameters from it if you still like them to be used. To provide more security, Prevent XSS Vulnerability also escape the HTML in the $_GET parameter which is commonly used to get parameters in PHP from the URL and print them in the HTML. This way, HTML properties will not work if anyone provided it in the URL. There are many ways by which the plugin can be tested but it may varies for different sites according to their structure and development functionality.

安装:

This process defines you the steps to follow either you are installing through WordPress or Manually from FTP. From within WordPress
  1. Visit 'Plugins > Add New'
  2. Search for Prevent XSS Vulnerability
  3. Activate Prevent XSS Vulnerability from your Plugins page.
  4. Go to "after activation" below.
Manually
  1. Upload the prevent-xss-vulnerability folder to the /wp-content/plugins/ directory
  2. Activate Prevent XSS Vulnerability through the 'Plugins' menu in WordPress
  3. Go to "after activation" below.
After activation
  1. Navigate to the Prevent XSS Vulnerability page from the Admin Dashboard
  2. Make the changes as per your site functionality
  3. You're done!

常见问题:

Q. Why should I install this plugin?

A. Installing this plugin is the easiest way to prevent your site from XSS Vulnerability.

Q. Does this plugin escape HTML in printing search?

A. Yes, this plugin escape HTML in $_GET variable which is mostly use to print the data from the URL to HTML. If your site is using $_GET then it is safe and the HTML will be escaped otherwise you need to check.

Q. Does this plugin has any conflict with any other plugin?

A. No, this plugin doesn't have any conflict with any plugin.

更新日志:

2.0.0 - Jul 14, 21 1.0.0 - Aug 24, 20 Earlier versions