diff options
author | joey <joey@0fa5a96a-9a0e-0410-b3b2-a0fd24251071> | 2007-07-11 16:50:59 +0000 |
---|---|---|
committer | joey <joey@0fa5a96a-9a0e-0410-b3b2-a0fd24251071> | 2007-07-11 16:50:59 +0000 |
commit | a8fa52080d8ba1df29543df5c6180b620cae59f6 (patch) | |
tree | b2ec8831da7c39c6ce256b16602274f895e91e87 /doc | |
parent | 68ae662e6fdca019adffbc59ca27418eb39de8da (diff) |
* Allow simple alphanumeric style attribute values in the htmlscrubber. This
should be safe from javascript attacks.
Diffstat (limited to 'doc')
-rw-r--r-- | doc/plugins/htmlscrubber.mdwn | 8 |
1 files changed, 7 insertions, 1 deletions
diff --git a/doc/plugins/htmlscrubber.mdwn b/doc/plugins/htmlscrubber.mdwn index 7962b3b52..cc749e2dc 100644 --- a/doc/plugins/htmlscrubber.mdwn +++ b/doc/plugins/htmlscrubber.mdwn @@ -7,7 +7,12 @@ to avoid XSS attacks and the like. It excludes all html tags and attributes except for those that are whitelisted using the same lists as used by Mark Pilgrim's Universal Feed Parser, documented at <http://feedparser.org/docs/html-sanitization.html>. -Notably it strips `style`, `link`, and the `style` attribute. +Notably it strips `style` and `link`. + +For the `style` attribute, it varys slightly from the Universal Feed +Parser, accepting simple alphanumeric style attributes (style="foo"), but +stripping anything more complex to avoid any of the ways to insert +JavaScript via style attributes. It uses the [[cpan HTML::Scrubber]] perl module to perform its html sanitisation, and this perl module also deals with various entity encoding @@ -36,3 +41,4 @@ plugin is active: * <span style="background: url(javascript:window.location='http://example.org/')">CSS script test</span> * <span style="any: expression(window.location='http://example.org/')">entity-encoded CSS script test</span> * <span style="any: expression(window.location='http://example.org/')">entity-encoded CSS script test</span> +* <span style="pretty">OTOH, this is ok, and will be accepted</a> |