Is there any mechanism already implemented in IRIS to prevent XSS exploits ?
This case happen when user input html/javascript content into fields and submit the page. If saved content is rendered as is, it's going to be executed by anyone visiting the page.
What I am looking for :
- Built-in protection mechanisms that can be enabled globally (eg: per web application) or per CSP page. Something similar to a web application firewall.
- Functions to call manually that can detect such content in fields or sanitize them (remove unwanted content).


.png)
.png)

