mirror of
https://git.freebsd.org/ports.git
synced 2025-07-18 09:49:18 -04:00
There are a lot of XSS, a security hole typically found in web
applications, caused by incorrect (or lack of) JavaScript escaping. This module is aimed to provide a secure JavaScript escaping to avoid XSS with JavaScript values. The escaping routine JavaScript::Value::Escape provides escapes q!"!, q!'!, q!&!, q!=!, q!-!, q!+!, q!;!, q!<!, q!>!, q!/!, q!\! and control characters to JavaScript unicode entities like "\u0026". WWW: http://search.cpan.org/dist/JavaScript-Value-Escape/
This commit is contained in:
parent
af3d859e51
commit
d14dec2ee2
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=274317
5 changed files with 41 additions and 0 deletions
|
@ -213,6 +213,7 @@
|
||||||
SUBDIR += p5-JavaScript
|
SUBDIR += p5-JavaScript
|
||||||
SUBDIR += p5-JavaScript-SpiderMonkey
|
SUBDIR += p5-JavaScript-SpiderMonkey
|
||||||
SUBDIR += p5-JavaScript-Squish
|
SUBDIR += p5-JavaScript-Squish
|
||||||
|
SUBDIR += p5-JavaScript-Value-Escape
|
||||||
SUBDIR += p5-List-MoreUtils
|
SUBDIR += p5-List-MoreUtils
|
||||||
SUBDIR += p5-Modern-Perl
|
SUBDIR += p5-Modern-Perl
|
||||||
SUBDIR += p5-Parse-Perl
|
SUBDIR += p5-Parse-Perl
|
||||||
|
|
21
lang/p5-JavaScript-Value-Escape/Makefile
Normal file
21
lang/p5-JavaScript-Value-Escape/Makefile
Normal file
|
@ -0,0 +1,21 @@
|
||||||
|
# New ports collection makefile for: JavaScript::Value::Escape
|
||||||
|
# Date created: 19 May 2011
|
||||||
|
# Whom: Jun Kuriyama <kuriyama@FreeBSD.org>
|
||||||
|
#
|
||||||
|
# $FreeBSD$
|
||||||
|
#
|
||||||
|
|
||||||
|
PORTNAME= JavaScript-Value-Escape
|
||||||
|
PORTVERSION= 0.05
|
||||||
|
CATEGORIES= lang perl5
|
||||||
|
MASTER_SITES= CPAN
|
||||||
|
PKGNAMEPREFIX= p5-
|
||||||
|
|
||||||
|
MAINTAINER= kuriyama@FreeBSD.org
|
||||||
|
COMMENT= Perl extension to avoid XSS with JavaScript value interpolation
|
||||||
|
|
||||||
|
PERL_CONFIGURE= yes
|
||||||
|
|
||||||
|
MAN3= JavaScript::Value::Escape.3
|
||||||
|
|
||||||
|
.include <bsd.port.mk>
|
2
lang/p5-JavaScript-Value-Escape/distinfo
Normal file
2
lang/p5-JavaScript-Value-Escape/distinfo
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
SHA256 (JavaScript-Value-Escape-0.05.tar.gz) = 1fc6770c1a8d8fb0a9f17d3d40d71e52ae3b073676b8bc95f4f6eeca76a64011
|
||||||
|
SIZE (JavaScript-Value-Escape-0.05.tar.gz) = 20856
|
10
lang/p5-JavaScript-Value-Escape/pkg-descr
Normal file
10
lang/p5-JavaScript-Value-Escape/pkg-descr
Normal file
|
@ -0,0 +1,10 @@
|
||||||
|
There are a lot of XSS, a security hole typically found in web
|
||||||
|
applications, caused by incorrect (or lack of) JavaScript
|
||||||
|
escaping. This module is aimed to provide a secure JavaScript
|
||||||
|
escaping to avoid XSS with JavaScript values.
|
||||||
|
|
||||||
|
The escaping routine JavaScript::Value::Escape provides escapes q!"!,
|
||||||
|
q!'!, q!&!, q!=!, q!-!, q!+!, q!;!, q!<!, q!>!, q!/!, q!\! and control
|
||||||
|
characters to JavaScript unicode entities like "\u0026".
|
||||||
|
|
||||||
|
WWW: http://search.cpan.org/dist/JavaScript-Value-Escape/
|
7
lang/p5-JavaScript-Value-Escape/pkg-plist
Normal file
7
lang/p5-JavaScript-Value-Escape/pkg-plist
Normal file
|
@ -0,0 +1,7 @@
|
||||||
|
%%SITE_PERL%%/%%PERL_ARCH%%/auto/JavaScript/Value/Escape/.packlist
|
||||||
|
%%SITE_PERL%%/JavaScript/Value/Escape.pm
|
||||||
|
@dirrm %%SITE_PERL%%/JavaScript/Value
|
||||||
|
@dirrm %%SITE_PERL%%/JavaScript
|
||||||
|
@dirrm %%SITE_PERL%%/%%PERL_ARCH%%/auto/JavaScript/Value/Escape
|
||||||
|
@dirrm %%SITE_PERL%%/%%PERL_ARCH%%/auto/JavaScript/Value
|
||||||
|
@dirrm %%SITE_PERL%%/%%PERL_ARCH%%/auto/JavaScript
|
Loading…
Add table
Reference in a new issue