Updated XSS filter options to allow style tag and style attribute

This commit is contained in:
Cheng-Han, Wu 2016-02-11 14:33:21 -06:00
parent 4c4a0e0f3f
commit 2a774064af

View file

@ -1,13 +1,23 @@
function preventXSS(html) { var whiteListAttr = ['id', 'class', 'style'];
var options = {
allowCommentTag: true, var filterXSSOptions = {
onIgnoreTagAttr: function (tag, name, value, isWhiteAttr) { allowCommentTag: true,
// allow attr start with 'data-' or equal 'id' and 'class' onIgnoreTag: function (tag, html, options) {
if (name.substr(0, 5) === 'data-' || name === 'id' || name === 'class') { // allow style in html
// escape its value using built-in escapeAttrValue function if (tag === 'style') {
return name + '="' + filterXSS.escapeAttrValue(value) + '"'; // do not filter its attributes
} return html;
} }
}; },
return filterXSS(html, options); onIgnoreTagAttr: function (tag, name, value, isWhiteAttr) {
// allow attr start with 'data-' or in the whiteListAttr
if (name.substr(0, 5) === 'data-' || whiteListAttr.indexOf(name) !== -1) {
// escape its value using built-in escapeAttrValue function
return name + '="' + filterXSS.escapeAttrValue(value) + '"';
}
}
};
function preventXSS(html) {
return filterXSS(html, filterXSSOptions);
} }