Escape XML (instance security hardening)
-
- UpdatedFeb 1, 2024
- 2 minutes to read
- Washington DC
- Platform Security
The glide.ui.escape_text property forces escape of XML values at the parser level before transmitting them to the client's browser.
Note: This property is set to true by default in Vancouver and later releases, and can't be changed by administrators. For a use case where the property has to be changed, contact customer support.
Cross-site scripting occurs when an attacker injects malicious JavaScript into an entry
point. The platform/application fails to escape the malicious JavaScript before transmitting
it to the victim's browser for execution. Escaping in this context means the following:
- & -->
&
- < -->
<
- > -->
>
- " -->
"
- ' -->
'
- / -->
/
Example: <script>alert('XSS Attack');</script>
Escaping: <script>alert('XSS
Attack');</script>
More information
To learn more about adding or creating a system property, see Add a system property.