元素类型 "meta" 必须由匹配的结束标记 "</meta>" 终止

 来自: https://blog.csdn.net/Luck_ZZ/article/details/79361497

在Maven中添加依赖

<dependency>  
    <groupId>net.sourceforge.nekohtml</groupId>  
    <artifactId>nekohtml</artifactId>  
    <version>1.9.22</version>  
</dependency> 

在配置文件application.properties中,对thymeleaf模板设置。

LEGACYHTML5需要搭配NekoHTML库才可用,实现thymeleaf非严格检查。

#thymeleaf  
spring.thymeleaf.encoding=UTF-8  
spring.thymeleaf.suffix=.html  
#默认严格检查  
#spring.thymeleaf.mode=HTML5  
#非严格检查  
spring.thymeleaf.mode=LEGACYHTML5
class=&quot;bg s_btn&quot;>&lt;/span> &lt;/form> &lt;/div> &lt;/div> &lt;div id=u1> &lt;a href=http://news.baidu.com name=tj_trnews class=mnav>新闻&lt;/a> &lt;a href=http://www.hao123.com name=tj_trhao123 class=mnav>hao123&lt;/a> &lt;a href=http://map.baidu.com name=tj_trmap class=mnav>地图&lt;/a> &lt;a href=http://v.baidu.com name=tj_trvideo class=mnav>视频&lt;/a> &lt;a href=http://tieba.baidu.com name=tj_trtieba class=mnav>贴吧&lt;/a> &lt;noscript> &lt;a href=http://www.baidu.com/bdorz/login.gif?login&amp;tpl=mn&amp;u=http://www.baidu.com/?bdorz_come=1 name=tj_login class=lb>登录&lt;/a> &lt;/noscript> &lt;script>document.write('&lt;a href=&quot;http://www.baidu.com/bdorz/login.gif?login&tpl=mn&u=' encodeURIComponent(window.location.href (window.location.search === &quot;&quot; ? &quot;?&quot; : &quot;&&quot;) &quot;bdorz_come=1&quot;) '&quot; name=&quot;tj_login&quot; class=&quot;lb&quot;>登录&lt;/a>');&lt;/script> &lt;a href=/www.baidu.com/more/ name=tj_briicon class=bri style=&quot;display: block;&quot;>更多产品&lt;/a> &lt;/div> &lt;/div> &lt;/div> &lt;div id=ftCon> &lt;div id=ftConw> &lt;p id=lh> &lt;a href=http://home.baidu.com>关于百度&lt;/a> &lt;a href=http://ir.baidu.com>About Baidu&lt;/a> &lt;/p> &lt;p id=cp>&copy;2017&nbsp;Baidu&nbsp;&lt;a href=http://www.baidu.com/duty/>使用百度前必读&lt;/a>&nbsp; &lt;a href=http://jianyi.baidu.com/ class=cp-feedback>意见反馈&lt;/a>&nbsp;京ICP证030173号&nbsp; &lt;img src=/www.baidu.com/img/gs.gif> &lt;/p> &lt;/div> &lt;/div> &lt;/div> &lt;/body> 危害说明:攻击者利用此漏洞盗取用户COOKIE信息,伪造用户身份登录WEB系统,当盗取的是普通用户的COOKIE时,普通用户的个人安全受到威胁,当盗取的是管理员或者特殊用户的COOKIE时,威胁到整个WEB系统的安全。 规则名称:style标签跨站脚本攻击 参考信息:- 解决方案:- 深信服Wiki:https://sec.sangfor.com.cn/security-vulnerability/detail?vuln_sfv=SF_2019_04065&lang=ZH-CN class=&quot;bg s_btn&quot;>&lt;/span> &lt;/form> &lt;/div> &lt;/div> &lt;div id=u1> &lt;a href=http://news.baidu.com name=tj_trnews class=mnav>新闻&lt;/a> &lt;a href=http://www.hao123.com name=tj_trhao123 class=mnav>hao123&lt;/a> &lt;a href=http://map.baidu.com name=tj_trmap class=mnav>地图&lt;/a> &lt;a href=http://v.baidu.com name=tj_trvideo class=mnav>视频&lt;/a> &lt;a href=http://tieba.baidu.com name=tj_trtieba class=mnav>贴吧&lt;/a> &lt;noscript> &lt;a href=http://www.baidu.com/bdorz/login.gif?login&tpl=mn&u=http://www.baidu.com/?bdorz_come=1 name=tj_login class=lb>登录&lt;/a> &lt;/noscript> &lt;script>document.write('&lt;a href=&quot;http://www.baidu.com/bdorz/login.gif?login&tpl=mn&u=' encodeURIComponent(window.location.href (window.location.search === &quot;&quot; ? &quot;?&quot; : &quot;&&quot;) &quot;bdorz_come=1&quot;) '&quot; name=&quot;tj_login&quot; class=&quot;lb&quot;>登录&lt;/a>');&lt;/script> &lt;a href=/www.baidu.com/more/ name=tj_briicon class=bri style=&quot;display: block;&quot;>更多产品&lt;/a> &lt;/div> &lt;/div> &lt;/div> &lt;div id=ftCon> &lt;div id=ftConw> &lt;p id=lh> &lt;a href=http://home.baidu.com>关于百度&lt;/a> &lt;a href=http://ir.baidu.com>About Baidu&lt;/a> &lt;/p> &lt;p id=cp>©2017 Baidu &lt;a href=http://www.baidu.com/duty/>使用百度前必读&lt;/a>  &lt;a href=http://jianyi.baidu.com/ class=cp-feedback>意见反馈&lt;/a> 京ICP证030173号  &lt;img src=/www.baidu.com/img/gs.gif> &lt;/p> &lt;/div> &lt;/div> &lt;/div> &lt;/body> 这段完整数据包是否为XSS攻击
最新发布
11-05
&lt;!DOCTYPE html> &lt;html> &lt;head> &lt;title>Runtime Error&lt;/title> &lt;meta name=&quot;viewport&quot; content=&quot;width=device-width&quot; /> &lt;style> body { font-family: &quot;Verdana&quot;; font-weight: normal; font-size: .7em; color: black; } p { font-family: &quot;Verdana&quot;; font-weight: normal; color: black; margin-top: -5px } b { font-family: &quot;Verdana&quot;; font-weight: bold; color: black; margin-top: -5px } H1 { font-family: &quot;Verdana&quot;; font-weight: normal; font-size: 18pt; color: red } H2 { font-family: &quot;Verdana&quot;; font-weight: normal; font-size: 14pt; color: maroon } pre { font-family: &quot;Consolas&quot;, &quot;Lucida Console&quot;, Monospace; font-size: 11pt; margin: 0; padding: 0.5em; line-height: 14pt } .marker { font-weight: bold; color: black; text-decoration: none; } .version { color: gray; } .error { margin-bottom: 10px; } .expandable { text-decoration: underline; font-weight: bold; color: navy; cursor: hand; } @media screen and (max-width: 639px) { pre { width: 440px; overflow: auto; white-space: pre-wrap; word-wrap: break-word; } } @media screen and (max-width: 479px) { pre { width: 280px; } } &lt;/style> &lt;/head> &lt;body bgcolor=&quot;white&quot;> &lt;span>&lt;H1>Server Error in &#39;/' Application.&lt;hr width=100% size=1 color=silver>&lt;/H1> &lt;h2> &lt;i>Runtime Error&lt;/i> &lt;/h2>&lt;/span> &lt;font face=&quot;Arial, Helvetica, Geneva, SunSans-Regular, sans-serif &quot;> &lt;b> Description: &lt;/b>An application error occurred on the server. The current custom error settings for this application prevent the details of the application error from being viewed remotely (for security reasons). It could, however, be viewed by browsers running on the local server machine. &lt;br>&lt;br> &lt;b>Details:&lt;/b> To enable the details of this specific error message to be viewable on remote machines, please create a &lt;customErrors> tag within a &quot;web.config&quot; configuration file located in the root directory of the current web application. This &lt;customErrors> tag should then have its &quot;mode&quot; attribute set to &quot;Off&quot;.&lt;br>&lt;br> &lt;table width=100% bgcolor=&quot;#ffffcc&quot;> &lt;tr> &lt;td> &lt;code>&lt;pre> &lt;!-- Web.Config Configuration File --> &lt;configuration> &lt;system.web> &lt;customErrors mode=&quot;Off&quot;/> &lt;/system.web> &lt;/configuration>&lt;/pre>&lt;/code> &lt;/td> &lt;/tr> &lt;/table> &lt;br> &lt;b>Notes:&lt;/b> The current error page you are seeing can be replaced by a custom error page by modifying the &quot;defaultRedirect&quot; attribute of the application's &lt;customErrors> configuration tag to point to a custom error page URL.&lt;br>&lt;br> &lt;table width=100% bgcolor=&quot;#ffffcc&quot;> &lt;tr> &lt;td> &lt;code>&lt;pre> &lt;!-- Web.Config Configuration File --> &lt;configuration> &lt;system.web> &lt;customErrors mode=&quot;RemoteOnly&quot; defaultRedirect=&quot;mycustompage.htm&quot;/> &lt;/system.web> &lt;/configuration>&lt;/pre>&lt;/code> &lt;/td> &lt;/tr> &lt;/table> &lt;br> &lt;/body> &lt;/html>
07-26
评论 1
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值