NAME

JavaScript::Value::Escape - Avoid XSS with JavaScript value interpolation

SYNOPSIS

use JavaScript::Value::Escape;

my $escaped = javascript_value_escape(q!&foo"bar'</script>!);
# $escaped is "\u0026foo\u0022bar\u0027\u003c\/script\u003e"

my $html_escaped = javascript_value_escape(Text::Xslate::Util::escape_html(q!&foo"bar'</script>!));

print <<EOF;
<script>
var param = '$escaped';
alert(param);

document.write('$html_escaped');

</script>
EOF

DESCRIPTION

There are a lot of XSS, a security hole typically found in web applications, caused by incorrect (or lack of) JavaScript escaping. This module aims to provide secure JavaScript escaping to avoid XSS with JavaScript values.

The escaping routine JavaScript::Value::Escape provides escapes for q!"!, q!'!, q!&!, q!=!, q!-!, q!+!, q!;!, q!<!, q!>!, q!/!, q!\! and control characters to JavaScript unicode entities like "\u0026".

EXPORT FUNCTION

javascript_value_escape($value :Str) :Str

Escape a string. The argument of this function must be a text string (a.k.a. UTF-8 flagged string, Perl's internal form).

This is exported by default.

js($value :Str) :Str

Alias to javascript_value_escape() for convenience.

This is exported by your request.

AUTHOR

Masahiro Nagano <kazeburo {at} gmail.com>

THANKS TO

Fuji, Goro (gfx)

SEE ALSO

http://subtech.g.hatena.ne.jp/mala/20100222/1266843093 - About XSS caused by buggy JavaScript escaping for HTML script sections (Japanese)

http://blog.nomadscafe.jp/2010/11/htmlscript.html - Wrote a module (JavaScript::Value::Escape) to escape data for HTML script sections (Japanese)

https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet - Preventing XSS (Cross Site Scripting) (English)

RFC4627 - The application/json Media Type for JSON

LICENSE

This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself.