Hubbry Logo
search button
Sign in
HTML sanitization
HTML sanitization
Comunity Hub
History
arrow-down
starMore
arrow-down
bob

Bob

Have a question related to this hub?

bob

Alice

Got something to say related to this hub?
Share it here.

#general is a chat channel to discuss anything related to the hub.
Hubbry Logo
search button
Sign in
HTML sanitization
Community hub for the Wikipedia article
logoWikipedian hub
Welcome to the community hub built on top of the HTML sanitization Wikipedia article. Here, you can discuss, collect, and organize anything related to HTML sanitization. The purpose of the hub is to conne...
Add your contribution
HTML sanitization

In data sanitization, HTML sanitization is the process of examining an HTML document and producing a new HTML document that preserves only whatever tags and attributes are designated "safe" and desired. HTML sanitization can be used to protect against attacks such as cross-site scripting (XSS) by sanitizing any HTML code submitted by a user.

Details

[edit]

Basic tags for changing fonts are often allowed, such as <b>, <i>, <u>, <em>, and <strong> while more advanced tags such as <script>, <object>, <embed>, and <link> are removed by the sanitization process. Also potentially dangerous attributes such as the onclick attribute are removed in order to prevent malicious code from being injected.

Sanitization is typically performed by using either a whitelist or a blacklist approach. Leaving a safe HTML element off a whitelist is not so serious; it simply means that that feature will not be included post-sanitation. On the other hand, if an unsafe element is left off a blacklist, then the vulnerability will not be sanitized out of the HTML output. An out-of-date blacklist can therefore be dangerous if new, unsafe features have been introduced to the HTML Standard.

Further sanitization can be performed based on rules which specify what operation is to be performed on the subject tags. Typical operations include removal of the tag itself while preserving the content, preserving only the textual content of a tag or forcing certain values on attributes.[1]

Implementations

[edit]

In PHP, HTML sanitization can be performed using the strip_tags() function at the risk of removing all textual content following an unclosed less-than symbol or angle bracket.[2] The HTML Purifier library is another popular option for PHP applications.[3]

In Java (and .NET), sanitization can be achieved by using the OWASP Java HTML Sanitizer Project.[4]

In .NET, a number of sanitizers use the Html Agility Pack, an HTML parser.[5][6][1] Another library is HtmlSanitizer.[7]

In JavaScript there are "JS-only" sanitizers for the back end, and browser-based[8] implementations that use browser's own Document Object Model (DOM) parser to parse the HTML (for better performance).

References

[edit]
  1. ^ a b "HtmlRuleSanitizer". GitHub. 13 August 2021.
  2. ^ "strip_tags". PHP.NET.
  3. ^ "HTML Purifier - Filter your HTML the standards-compliant way!". htmlpurifier.org.
  4. ^ "OWASP Java HTML Sanitizer".
  5. ^ "HTML Agility Pack - Home". Archived from the original on 2013-01-01. Retrieved 2013-01-04.
  6. ^ "Whitelist santize with HtmlAgilityPack". 14 June 2011.
  7. ^ Ganss, Michael (5 December 2023). "HtmlSanitizer". Retrieved 7 December 2023.
  8. ^ "JS HTML Sanitizer". GitHub. 14 October 2021.