tags:

views:

291

answers:

2

I was asking myself about the security of using the php function htmlentities() against XSS attacks, and maybe of related functions such as htmlspecialchars.

thanks a lot :)

+2  A: 

You will need to explicitly specify proper encoding (e.g: utf-8), Chris had a post on how to inject code even calling htmlentities without appropriate encoding.

http://shiflett.org/blog/2005/dec/google-xss-example

Jay Zeng
Thanks a lot that is exactly the kind of proof i was looking for :) i have to study encoding issues. Do you know some good documentation about that?
fatmatto
I encourage you to read a real world example of Gmail contact xss, and reading the exploit, which is downloadable in the below post, will hopefully give you some ideas of how to write secure code:http://uneasysilence.com/archive/2007/01/9025/And here is a cheat sheet you may find useful:http://openmya.hacker.jp/hasegawa/security/utf7cs.html
Jay Zeng
Thank you very very much :D
fatmatto
Glad it helps :)
Jay Zeng
+1  A: 

It is not bullet-proof, it never saves you 100%. You must remember that when it comes to security, the developer is responsible for it. Languages do provide good deal of security functions and more so it is up to developer how they secure their site whether they use whitelist approach or blacklist approach. If htmlentities was all, frameworks like codeigniter, kohana and more would not have come up with their own great security functions.

The most important thing is to sanitalize and filter any input coming from the user.

Sarfraz