Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Zend Developer Zone:
Avoiding XSS security attacks to sites that use HTML editors
Mar 27, 2007 @ 15:03:00

In an article from the Zend Developer Zone by Manuel Lemos, there's a look at how to avoid cross-site scripting security attacks on a site that allows users to input information via a HTML editor.

HTML editors are great. However, care must be taken to avoid security abuses. An application that uses HTML editors, expects that the submitted HTML content comes correctly formatted and well-formed. That happens when real users use real browsers to edit the content.

However, an attacker may create a program that pretends to be a real browser and submit specially crafted HTML with Javascript that may open security holes.

Manuel talks a bit about what cross-site scripting means in this context and a simple (Javascript) example of how a user could abuse it. His solution? Parse the incoming data (filter it!) and look for potentially harmful tag types. To do this, he recommends the PHP Input Filter class. There's even a simple example of how to use it included in the post.

tagged: crosssitescripting htmleditor fckeditor xss inputfilter class crosssitescripting htmleditor fckeditor xss inputfilter class

Link:

Zend Developer Zone:
Avoiding XSS security attacks to sites that use HTML editors
Mar 27, 2007 @ 15:03:00

In an article from the Zend Developer Zone by Manuel Lemos, there's a look at how to avoid cross-site scripting security attacks on a site that allows users to input information via a HTML editor.

HTML editors are great. However, care must be taken to avoid security abuses. An application that uses HTML editors, expects that the submitted HTML content comes correctly formatted and well-formed. That happens when real users use real browsers to edit the content.

However, an attacker may create a program that pretends to be a real browser and submit specially crafted HTML with Javascript that may open security holes.

Manuel talks a bit about what cross-site scripting means in this context and a simple (Javascript) example of how a user could abuse it. His solution? Parse the incoming data (filter it!) and look for potentially harmful tag types. To do this, he recommends the PHP Input Filter class. There's even a simple example of how to use it included in the post.

tagged: crosssitescripting htmleditor fckeditor xss inputfilter class crosssitescripting htmleditor fckeditor xss inputfilter class

Link:


Trending Topics: