-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Joe,
Joseph McGranaghan wrote: > So, tags I'm originally NOT allowing are: > > <applet> <script> <embed> <object> <server> <frame> <iframe> <frameset> > <html> <body> Okay. If you're going to do this: > I'm removing all javascript event attributes ( onclick="alert('xss');" ) ...then why do this: > Removing all javascript escaped quotes: \' and \" ?? You don't allow <script> tags (and anything within them, I imagine), and you are removing javascript events, so there shouldn't be any javascript left over... right? > In any tag left that has a link in it (src|href|action), I'm making sure > it is NOT relative and NOT to my server: <a> <img> <ilayer> <form> I guess this would be protecting against a SSS (same-side scripting) issue? ;) > Any 'target' attributes, I'm changing to target='_blank', although I > still think there is a security flaw in here for a popup window trying > to run code on the originating page. Note that XHTML forbids the "target" attribute. It's still widely supported, though. > I will be checking CSS urls. Perhaps you should simply disallow <link> elements. You aren't allowing <body>, so I'm guessing that <head> isn't allowed, which means that <link> also isn't. I think you can ignore over-escaping javascript, since you're pretty much eliminated it in the previous steps. - -chris -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFF+rQR9CaO5/Lv0PARAqc+AJ0TEj4eTXZIK4JY+DksIbWMmVYtsgCdGgKb 5aXL7MPDFohobgBhKIVBndk= =M9f9 -----END PGP SIGNATURE----- --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]