/* * Copyright (C) 2015 Dominik Schadow, info@dominikschadow.de * * This file is part of the Java-Web-Security project. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package de.dominikschadow.webappsecurity; import javax.faces.bean.ManagedBean; import javax.faces.bean.SessionScoped; import java.io.Serializable; import java.util.LinkedHashMap; import java.util.Map; /** * Bean representing user input into the standard protected output page * (no additional security related attributes). * * @author Dominik Schadow */ @ManagedBean(name = "standard") @SessionScoped public class StandardController implements Serializable { private static final long serialVersionUID = 4083596061570021965L; private String input = "<script>alert('XSS with JSF')</script>"; private Map<String, String> standardMap = null; private Status[] standardArray = null; public Map<String, String> getStandardMap() { return standardMap; } public Status[] getStandardArray() { return standardArray; } public String getInput() { return input; } public void setInput(String input) { this.input = input; standardMap = new LinkedHashMap<>(); standardMap.put(input, input); standardArray = new Status[1]; standardArray[0] = new Status(input); } }