Updated XSS filter options to allow style tag and style attribute

This commit is contained in:
Cheng-Han, Wu 2016-02-11 14:33:21 -06:00
parent 4c4a0e0f3f
commit 2a774064af

View file

@ -1,13 +1,23 @@
function preventXSS(html) {
var options = {
var whiteListAttr = ['id', 'class', 'style'];
var filterXSSOptions = {
allowCommentTag: true,
onIgnoreTag: function (tag, html, options) {
// allow style in html
if (tag === 'style') {
// do not filter its attributes
return html;
}
},
onIgnoreTagAttr: function (tag, name, value, isWhiteAttr) {
// allow attr start with 'data-' or equal 'id' and 'class'
if (name.substr(0, 5) === 'data-' || name === 'id' || name === 'class') {
// allow attr start with 'data-' or in the whiteListAttr
if (name.substr(0, 5) === 'data-' || whiteListAttr.indexOf(name) !== -1) {
// escape its value using built-in escapeAttrValue function
return name + '="' + filterXSS.escapeAttrValue(value) + '"';
}
}
};
return filterXSS(html, options);
function preventXSS(html) {
return filterXSS(html, filterXSSOptions);
}