开发者

How to escape JavaScript in an HTML String while keeping the HTML unescaped?

开发者 https://www.devze.com 2023-03-09 23:03 出处:网络
We have a webapplication. At some points there is a JavaScript based WSIWYG / RichText Editor. It filters some JavaScript but uses HTML text to format it\'s content.

We have a webapplication. At some points there is a JavaScript based WSIWYG / RichText Editor. It filters some JavaScript but uses HTML text to format it's content.

Unfortunately it does not filter all JavaScript. I was able to proof a XSS attack with an event handler. I think the JavaScript client side filtering of JavaScript is not开发者_开发百科 safe at all, because at client side it can be manipulated.

So I would like to filter or escape JavaScript at the server side. I had a short look at ESAPI for Java. But we have a requirement, I don't know if it is special or a problem: The HTML elements the editor uses should not be filtered or escaped, only JavaScript. The HTML should be ordinary rendered in the browser.

  • Is there a safe way, to escapce or filter JavaScript while keeping the HTML like it is?
  • Does ESAPI or any other API help me doing this?
  • How do I do it.

Thanks in advance.


It is difficult to state what escaping schemes have to be used to escape JavaScript without knowing whether the application is vulnerable to DOM-based XSS attacks or the run-of-the-mill (reflected and persistent) XSS attacks.

ESAPI for Java will help in both cases though. In the case of DOM-based XSS attacks, you would need to encode the unsafe data multiple times (and using different encoding schemes if necessary) to ensure that each parser in the parsing chain will not be subject to XSS attacks. In the case of reflected or persistent XSS attacks, you'll usually need to apply the escaping only once, in the appropriate context.

It should be kept in mind that, allowing raw HTML on its own is also unsafe, resulting in XSS. You might want to take a look at a different approach to sanitizing inputs; using AntiSamy for filtering HTML might be warranted in this case.


You need to parse the HTML and reject any tags and attributes that aren't in a strict whitelist of safe tags/attributes.

The whitelist would not include tags like <script>, <style>, or <link>, and it wouldn't include attributes like onclick, onload, or style.

You should also make sure that href and src attributes use the http or https protocols (or a relative path), and not javascript:.

0

精彩评论

暂无评论...
验证码 换一张
取 消