Package ch.tocco.nice2.toolbox.api
Class XssHtmlFilter
java.lang.Object
ch.tocco.nice2.toolbox.api.XssHtmlFilter
Filters html text and removes code classified as vulnerable.
For example, at least the following tags and/or attributes are suspicious:
- <script/>
- embeds executable code
- <applet>
- Embedds java applets
- <embed/> <object/>
- embeds external stuff
- <xml/>
- embeds meta statements
- <style>
- embeds style sheet instructions which may contain javascript
- <a href|link/>
- the anchor tag with
hreforlinkattribute, embeds external urls (javascript protocol) - <frame|iframe|input type=image|bgsound|img src/>
- tags with
srcattribute, embed external urls (javascript protocol). Alsodynsrcandlowsrcofimgtag onXxx- All event handlers
- <body|table|tr|td|th background
backgroundattribute may contain code using javascript protocolstyle=url()|expressoin()- Styles that allow specifying
url()orexpression(), likebackground-image:,behaviour:etc - <meta content=0; url=
- meta redirect. may execute code using javascript protocol
# to leave syntactically correct html while all others
are removed. Exceptions are anchor tags (see task #17742), the href attribute is left
and a blank target is added.-
Method Summary
Modifier and TypeMethodDescriptionstatic Stringstatic booleancontainsPotentialXssCode(String content) Just checks content for some potential Xss breaches like script elements, on-attributes, ...
-
Method Details
-
containsPotentialXssCode
Just checks content for some potential Xss breaches like script elements, on-attributes, ... -
clean
-