![]() |
Why is letting HTML dangerous?
I have read everywhere that letting a user post pure HTML is a site suicide.
I have accepted it for years as an axiom, like 1+1=2. However, I've seen popular blogging sites to allow their bloggers to change the template by providing them its whole HTML, including <script> tags and everything! Aren't they afraid? Have they taken any "special measures" to prevent abuse, and if so, what measures? |
Yes, allowing HTML can let hackers inject malicious Javascript into a page, which could potentially steal people's cookie data.
|
Quote:
|
Quote:
|
Quote:
|
Quote:
If so, then these blogging sites are not doing anything dangerous, each blog is its blogger's responsibility... |
But your forum is your responsibility.
|
Quote:
But I'm going to add blogs to it, and I'm wondering if I should let them customize the whole html template or just the css. That's why I asked :) |
There's also things like that Myspace friends worm that happened early on over there.
Had some shit where there was some javascript embedded on someone's profile and then everyone who came to that page was added as a friend to that person AND it also copied itself to the viewing person's profile. Within a day or so the guy who started it was friends with everyone on Myspace. Something like that. People can do weird, potentially dangerous things when they can stick whatever javascript they want on a page. |
So I'd better let them customize just the css?
Are there any exploits that someone can perform from css? (We suppose that the code will strip html tags so that's not the case) |
Yea I think CSS is ok
|
Letting CSS is okay, as exploits shouldn't be able to run from it.
|
Then why wordpress has this in the CSS comments?:
Quote:
|
Hmmm, in theory, browsers should parse CSS as CSS and nothing more. Haven't tested this across multiple browsers though.
|
|
Are there any options to limit HTML to "trusted" users, perhaps admins and moderators?
|
Not in stock vBulletin. There is a modification that does this though.
|
CSS can be dangerous too. There are even some vulnerabilities which rely on CSS, such as the cursor exploit.
|
Quote:
|
Not off the top of my head.
|
Quote:
|
You can't really. However this was a browser exploit (actually windows thing, but only affected IE). Windows had a bug with parsing the cursor files, so basically it would execute it as raw code or something, which then lead to the installation of about 5 different viruses :(
[off topic]: working on a clients site, and i had up to date virus definitions... i am very prompt with that kind of thing. he says there is a problem with his site, like it's been hacked or something. so I view it with firefox... looks fine. so he tells me to view it with IE and that was the end of it. It got in so deep I had to reformat my PC and I was off for about a week :( all this from a CSS exploit! I would strip out some annoying CSS things. Be careful with allowing it though, because they can change nearly everything on the page with CSS! |
All times are GMT. The time now is 03:38 AM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|