开发者

How safe is the data being parsed by RTF editors like TinyMCE?

开发者 https://www.devze.com 2023-01-13 00:50 出处:网络
I have a great concern in deploying the TinyMCE editor on a website. Looking at the code parsed by the editor it does a great job, and I leave the HTML button off the toolbar configuration so users 开

I have a great concern in deploying the TinyMCE editor on a website. Looking at the code parsed by the editor it does a great job, and I leave the HTML button off the toolbar configuration so users 开发者_开发技巧can not inject their own source.

However, from what I read in the TinyMCE docs, it claims to degrade nicely to a regular textarea should javascript be disabled on a users browser... and therein lies my concern. If it does revert to a normal textarea, then the user is then able to easily inject their own HTML, and this leaves me with a security concern.

I just pass through data created with TinyMCE, and it is used within another page created by my script, so it poses no security risk to my server. The security concern arises over what malicious data may be passed to another user viewing the generated page.

I know many of you will tell me to just use regexes, or parse this data, but that itself could be a nightmare, as I would be trying to either...

a.) Use regexes to try and clean up the HTML without breaking the generated page, and it is better to parse the data for that anyway.

b.) Reparsing data that has already been parsed by the RTF editor, which also would probably end up breaking the generated page.

Anyone with any previous experience with this type of scenario, I would really appreciate a 'heads-up' as to any other risks that using an RTF editor for user data could entail. I would really like to provide this as a user option, but not if the risks outweigh giving the user using the RTF a chance to take a wack at another user viewing the page that is generated by the script.

My gut feeling is to steer a wide berth around use of the RTF at this point.

Thanks for any direction you can give me with your own experiences.


You cannot have client-side security on the web. You simply can't trust the browser, because it's easy for a malicious user to substitute a replacement browser that does whatever he wants.

If you accept HTML from users (using TinyMCE or through any other method) and display it to other users, you must sanitize or validate the HTML in some way on the server. If you're using Perl, the leading package seems to be HTML::Scrubber (along with various other modules that help you plug it in to various frameworks). I haven't had occasion to try it myself.

The TinyMCE Security page mentions some ways to make it harder for people to submit arbitrary HTML, but you still need server-side checks.


Regex is generally not considered good for parsing HTML RegEx match open tags except XHTML self-contained tags but I have noted the "perl" tag :)

My advice when taking markup from users is to always parse it through something that can accept mal-formed HTML and return well formed HTML. These parses generally produce something that can be queried and updated with some form of XPath.

In Python there is a module called BeautifulSoup, Ruby has Nokogiri and in ASP.NET there is a project called HtmlAgilityPack that all do this sort of thing. I'm not sure what library perl has, but I'm sure there would be something.

0

精彩评论

暂无评论...
验证码 换一张
取 消