Warning: file_get_contents(/data/phpspider/zhask/data//catemap/9/java/393.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
Java Can";c:set";是否导致跨站点脚本(XSS)漏洞?_Java_Jsp_Security_Xss_Query Parameters - Fatal编程技术网

Java Can";c:set";是否导致跨站点脚本(XSS)漏洞?

Java Can";c:set";是否导致跨站点脚本(XSS)漏洞?,java,jsp,security,xss,query-parameters,Java,Jsp,Security,Xss,Query Parameters,是否可以使用诸如localhost/?myVar=alert(document.cookie)或其他任何可能的URL将此漏洞作为XSS漏洞加以利用 <c:set var="myVar" value="<%=request.getParameter(\"myVar\")%>"/> <c:if test="${myVar == 'VALUE1'}"> <option val

是否可以使用诸如
localhost/?myVar=alert(document.cookie)
或其他任何可能的URL将此漏洞作为XSS漏洞加以利用

<c:set var="myVar" value="<%=request.getParameter(\"myVar\")%>"/>
<c:if test="${myVar == 'VALUE1'}">
   <option value="a">A</option>
   <option value="b">B</option>
</c:if>
<c:if test="${myVar == 'VALUE2'}">
   <option value="c">C</option>
   <option value="d">D</option>
</c:if>


A.
B
C
D
我们怎样才能保证自己不受这种伤害