Good luck with that - it's not (in general) possible to do this. Even
if you kill off all the scripting, with some CSS knowledge, a
malicious user could make a fake login page and phish people.

Little things like IE6 and 7's support of javascript in CSS attributes
could also cause trouble...

--Matt Jones

On May 12, 6:52 am, fausto <fausto.ga...@email.it> wrote:
> Hi, i'm allowing users to upload html stuff, what can i use to
> sanitize it? h() it's not good as it escape everything, and i've found
> that the rails sanitize() is too strict, it sanitize also css style
> attributes, so users cannot personalize their html... i'd like
> something which permit to include code like youtubbbe embedded, css
> styles (only inline, not by external link), which strip stuff like
> html, head and keep just the body, and all the script tags or btw
> everything which could cause xss and other problems... what do you
> suggest?
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "Ruby 
on Rails: Talk" group.
To post to this group, send email to rubyonrails-talk@googlegroups.com
To unsubscribe from this group, send email to 
rubyonrails-talk+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/rubyonrails-talk?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to