Method, system, and computer program product for avoiding cross-site scripting attacks
First Claim
Patent Images
1. A computer-implemented method for avoiding a network attack, the method comprising:
- executing a client program in a client computer system, wherein the client program executes to;
receive a uniform resource locator (URL) in a request to access the URL, wherein the URL references a server computer system;
in response to receiving the URL, automatically analyze the URL to determine whether the URL includes scripting code, wherein said analyzing comprises analyzing the URL to detect whether the URL includes one or more of;
scripting code elements defined by a first scripting language;
keywords identifying scripting code; and
tags identifying scripting code;
inhibit access to the URL in response to determining that the URL includes scripting code.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for protecting a user against a cross-site scripting attack or other network attack that relies on scripting code embedded within a uniform resource locator (URL) are described. Validation software executing on a client computer system may intercept a URL in response to a user providing the URL to a web browser or other client application. The validation software may analyze the URL to determine whether the URL includes scripting code. If the URL includes scripting code then the validation software may block the client application from accessing the URL or may otherwise inhibit access to the URL.
48 Citations
19 Claims
-
1. A computer-implemented method for avoiding a network attack, the method comprising:
executing a client program in a client computer system, wherein the client program executes to; receive a uniform resource locator (URL) in a request to access the URL, wherein the URL references a server computer system; in response to receiving the URL, automatically analyze the URL to determine whether the URL includes scripting code, wherein said analyzing comprises analyzing the URL to detect whether the URL includes one or more of; scripting code elements defined by a first scripting language; keywords identifying scripting code; and tags identifying scripting code; inhibit access to the URL in response to determining that the URL includes scripting code. - View Dependent Claims (2, 3, 4, 5, 6)
-
7. A computer-implemented method for avoiding a network attack, the method comprising:
executing a client program in a client computer system, wherein the client program executes to; receive a uniform resource locator (URL) in a request to access the URL, wherein the URL references a server computer system; in response to receiving the URL, automatically analyze the URL to determine whether the URL includes scripting code, wherein said analyzing comprises analyzing the URL to detect whether the URL includes scripting code elements defined by a first scripting language; and inhibit access to the URL in response to determining that the URL includes scripting code;
wherein said inhibiting access to the URL comprises;displaying information indicating that the URL includes scripting code; receiving user input indicating whether to block or allow access to the URL; and one of; blocking access to the URL if the user input indicates to block access to the URL;
orallowing access to the URL if the user input indicates to allow access to the URL.
-
8. A tangible, non-transitory computer-readable storage medium storing program instructions executable by a client computer system to:
-
receive a uniform resource locator (URL) in a request to access the URL, wherein the URL references a server computer system; in response to receiving the URL, automatically analyze the URL to determine whether the URL includes scripting code, wherein said analyzing comprises analyzing the URL to detect whether the URL includes one or more of; escape sequences for characters that do not need to be escaped;
keywords identifying scripting code; andtags identifying scripting code; inhibit access to the URL in response to determining that the URL includes scripting code. - View Dependent Claims (9, 10, 11)
-
-
12. A client computer system comprising:
-
one or more processors; and memory storing program instructions; wherein the program instructions are executable by the one or more processors to; receive a uniform resource locator (URL) in a request to access the URL, wherein the URL references a server computer system; in response to receiving the URL, automatically analyze the URL to determine whether the URL includes scripting code, wherein said analyzing comprises analyzing the URL to detect whether the URL includes one or more of; scripting code elements defined by a first scripting language; and keywords identifying scripting code; and tags identifying scripting code; inhibit access to the URL in response to determining that the URL includes scripting code. - View Dependent Claims (13)
-
-
14. A computer-implemented method for avoiding a network attack, the method comprising:
-
executing a client program in a client computer system, wherein the client program executes to; receive a uniform resource locator (URL) in a request to access the URL, wherein the URL references a server computer system; in response to receiving the URL, automatically analyze the URL to determine whether the URL includes scripting code, wherein said analyzing comprises analyzing the URL to determine whether the URL includes one or more of; HTML-reserved syntax that is used for introducing a script on a web page; and keywords identifying scripting code; and tags identifying scripting code; inhibit access to the URL in response to determining that the URL includes scripting code.
-
-
15. A computer-implemented method for avoiding a network attack, the method comprising:
executing a client program in a client computer system, wherein the client program executes to; receive a uniform resource locator (URL) in a request to access the URL, wherein the URL references a server computer system; in response to receiving the URL, automatically analyze the URL to determine whether the URL includes scripting code, wherein said analyzing comprises analyzing the URL to detect whether the URL includes one or more of; escape sequences for characters that do not need to be escaped; and keywords identifying scripting code; and tags identifying scripting code; inhibit access to the URL in response to determining that the URL includes scripting code.
-
16. A tangible, non-transitory computer-readable storage medium storing program instructions executable by a client computer system to:
-
receive a uniform resource locator (URL) in a request to access the URL, wherein the URL references a server computer system; in response to receiving the URL, automatically analyze the URL to determine whether the URL includes scripting code, wherein said analyzing comprises analyzing the URL to detect whether the URL includes one or more of; scripting code elements defined by a first scripting language; keywords identifying scripting code; and tags identifying scripting code inhibit access to the URL in response to determining that the URL includes scripting code.
-
-
17. A tangible, non-transitory computer-readable storage medium storing program instructions executable by a client computer system to:
-
receive a uniform resource locator (URL) in a request to access the URL, wherein the URL references a server computer system; in response to receiving the URL, automatically analyze the URL to determine whether the URL includes scripting code, wherein said analyzing comprises analyzing the URL to determine whether the URL includesone or more of; HTML-reserved syntax that is used for introducing a script on a web page; keywords identifying scripting code; and tags identifying scripting code; inhibit access to the URL in response to determining that the URL includes scripting code.
-
-
18. A client computer system comprising:
-
one or more processors; and memory storing program instructions; wherein the program instructions are executable by the one or more processors to; receive a uniform resource locator (URL) in a request to access the URL, wherein the URL references a server computer system; in response to receiving the URL, automatically analyze the URL to determine whether the URL includes scripting code, wherein said analyzing comprises analyzing the URL to determine whether the URL includes one or more of; HTML-reserved syntax that is used for introducing a script on a web page; and keywords identifying scripting code; and tags identifying scripting code; inhibit access to the URL in response to determining that the URL includes scripting code.
-
-
19. A client computer system comprising:
-
one or more processors; and memory storing program instructions; wherein the program instructions are executable by the one or more processors to; receive a uniform resource locator (URL) in a request to access the URL, wherein the URL references a server computer system; in response to receiving the URL, automatically analyze the URL to determine whether the URL includes scripting code, wherein said analyzing comprises analyzing the URL to detect whether the URL includes one or more of; escape sequences for characters that do not need to be escaped; keywords identifying scripting code; and tags identifying scripting code; inhibit access to the URL in response to determining that the URL includes scripting code.
-
Specification