Also, I think all the escaping is done by web2py's template engine, so you 
could avoid the escaping by skipping use of templates. To do that, have your 
controller action return a string of (unsafe) HTML instead of a dictionary 
of values to pass to a view -- the HTML string will be returned as the 
response to the browser without any sanitizing.

On Wednesday, June 29, 2011 10:47:06 PM UTC-4, Anthony wrote:

> Anything you put inside XML() will not be escaped (unless you set its 
> sanitize argument to True). See 
> http://web2py.com/book/default/chapter/05#XML.
>  
> Anthony
>
> On Wednesday, June 29, 2011 3:30:33 PM UTC-4, David Schoenheit wrote:
>
>> Hi, 
>>
>> I am using web2py to write an intentionally vulnerable web app in 
>> order to demonstrate basic cross site request forgery and cross site 
>> scripting attacks for educational purposes. I'm running into some 
>> problems where web2py is automatically html encoding my output and 
>> preventing the intended attacks from working. Is there a way to 
>> disable data sanitization in web2py? 
>>
>> Sorry if there is already a post on this subject, I searched for one 
>> and couldn't find anything. 
>>
>> Thanks for any help you can provide.
>
>

Reply via email to