Sanitize HTML before storing in the DB or before rendering? (AntiXSS library in ASP.NET)

后端 未结 4 1326
广开言路
广开言路 2020-12-29 11:59

I have an editor that lets users add HTML that is stored in the database and rendered on a web page. Since this is untrusted input, I plan to use Microsoft.Security.Ap

4条回答
  •  长发绾君心
    2020-12-29 12:35

    I disagree with the selected answer for two reasons

    1. If you stored encoded data, you have to pick an encoder before you store. What happens if you have stored something as HTML but also want to push it out in another format, for example as a JSON response, or as part of an XML document? You now have a an HTML encoded format you must decode, then encode in the correct format.
    2. What if we discover a bug in the encoders and push a new version out? Now, because you're not encoding at the point of output all your old data may contain things that have been incorrectly encoded. You can encode again, but then you hit double encoding issues which can be painful to filter correctly.

    Generally you encode at the point of output and treat any data coming from a data store as untrusted by default - after all, what if someone manages to edit your database directly or via SQL injection?

提交回复
热议问题