Yes it is much safer to reject rather than sanitize.  If bad tags are
detected then reject the input out of hand.  If you don't your
sanitizer could be turned against you and end up changing slightly
dangerous tags into really dangerous tags. What happens here
<scr<script>ipt> when a sanitizer is set to remove all of the script
tags?  If the user made a genuine mistake then let them fix it.
Otherwise it is a hack attempt and not worth your trouble.

On Jul 13, 8:08 am, Horst Gutmann <[EMAIL PROTECTED]> wrote:
> The problem with whatever system you use, is the huge amount of ways to
> inject XSS attacks into HTML thanks to problems in the various browser
> engines. A few weeks I found a nice listing (nice looooong listing) but
> can't remember the URL anymore :-/
>
> .. _BeautifulSoup:http://www.crummy.com/software/BeautifulSoup/


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Django users" group.
To post to this group, send email to django-users@googlegroups.com
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/django-users?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to