Protecting against evil code fragments with HTML Purifier


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News Protecting against evil code fragments with HTML Purifier
# 1  
Old 07-08-2008
Protecting against evil code fragments with HTML Purifier

Tue, 08 Jul 2008 08:00:00 GMT
HTML Purifier is a project that helps you ensure that HTML is valid and does not contain cross-site scripting attempts or other nasty attacks. With HTML Purifier you can allow users to post HTML content without letting them insert nasty code that will run in the browser of anyone viewing that HTML. An assortment of plugins let you use HTML Purifier with CodeIgniter, Drupal, MODx, Phorum, Joomla!, and WordPress. To get an idea of the cleanups that HTML Purifier can perform, head over to the demo page.


Source...
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Why the results of these two code fragments are not the same?

Code 1: #!/bin/sh for arg1 in "$@" do counter=0 for arg2 in "$@" do if && then counter=$((counter+1)) continue fi (8 Replies)
Discussion started by: johnprogrammer
8 Replies

2. UNIX for Advanced & Expert Users

fragments in Solaris 8

When discussing inodes and data blocks, I know Solaris creates these data blocks with a total size of 8192b, divided into eight 1024b "fragments." It stores data in "contiguous" fragments and solaris doesn't allow a file to use portions of two different fragments. If the file size permits, then the... (4 Replies)
Discussion started by: manderson19
4 Replies
Login or Register to Ask a Question
HTML::Mason::Escapes(3pm)				User Contributed Perl Documentation				 HTML::Mason::Escapes(3pm)

NAME
HTML::Mason::Escapes - Functions to escape text for Mason DESCRIPTION
This module contains functions for implementing Mason's substitution escaping feature. These functions may also be called directly. html_entities_escape This function takes a scalar reference and HTML-escapes it using the "HTML::Entities" module. By default, this module assumes that the string it is escaping is in ISO-8859-1 (pre Perl 5.8.0) or UTF-8 (Perl 5.8.0 onwards). If this is not the case for your data, you will want to override this escape to do the right thing for your encoding. See the section on User-defined Escapes in the Developer's Manual for more details on how to do this. url_escape This takes a scalar reference and replaces any text it contains matching "[^a-zA-Z0-9_.-]" with the URL-escaped equivalent, a percent sign (%) followed by the hexadecimal number of that character. basic_html_escape This function takes a scalar reference and HTML-escapes it, escaping the following characters: '&', '>', '<', and '"'. It is provided for those who wish to use it to replace (or supplement) the existing 'h' escape flag, via the Interpreter's "set_escape()" method. This function is provided in order to allow people to return the HTML escaping behavior in 1.0x. However, this behavior presents a potential security risk of allowing cross-site scripting attacks. HTML escaping should always be done based on the character set a page is in. Merely escaping the four characters mentioned above is not sufficient. The quick summary of why is that for some character sets, characters other than '<' may be interpreted as a "less than" sign, meaning that just filtering '<' and '>' will not stop all cross-site scripting attacks. See http://www.megasecurity.org/Info/cross-site_scripting.txt for more details. perl v5.14.2 2012-02-04 HTML::Mason::Escapes(3pm)