admin管理员组文章数量:1345171
I'm building a simple little chat with Node.js and socket.io
When a user types his message, it is broadcasted to all other users.
Server sends the message :
io.sockets.emit('fromServerToClient', { "message": message });
Client displays it :
socket.on('fromServerToClient', function (data) {
$('#messages').append(data.message + '<br />');
});
But when you send something like <script>alert(1);</script>
, it is executed on every client browser.
This is a serious security flaw and I want to avoid it as much as possible.
I've seen people escape &, <, > and "
characters, but I don't think it's enough!
How can I be 100% sure of not having a XSS vulnerability on my chat?
By the way, I always specify the charset to avoid UTF-7 attacks.
Thanks for your help.
I'm building a simple little chat with Node.js and socket.io
When a user types his message, it is broadcasted to all other users.
Server sends the message :
io.sockets.emit('fromServerToClient', { "message": message });
Client displays it :
socket.on('fromServerToClient', function (data) {
$('#messages').append(data.message + '<br />');
});
But when you send something like <script>alert(1);</script>
, it is executed on every client browser.
This is a serious security flaw and I want to avoid it as much as possible.
I've seen people escape &, <, > and "
characters, but I don't think it's enough!
How can I be 100% sure of not having a XSS vulnerability on my chat?
By the way, I always specify the charset to avoid UTF-7 attacks.
Thanks for your help.
Share Improve this question asked Jun 20, 2013 at 23:51 mimipcmimipc 1,3742 gold badges14 silver badges28 bronze badges2 Answers
Reset to default 9Don't use .html()
because that's basically eval
on steroids - capable of causing the interpretation of a good variety of languages.
Text is always interpreted as text though:
$('#messages').append($("<div>", {
text: data.message
}));
The best way here, is for the server to do nothing!
Yes, you read that right. The correct place to "escape" content is where it's being outputted, in the context where it's being outputted. This is known as Filter-In, Escape out.
So in your case, the client should handle the escaping for you. Funny enough, jQuery (which it looks like you're using) has a method that does this for you: $.fn.text()
. So your client code bees:
socket.on('fromServerToClient', function (data) {
$('#messages').append($('<div></div>').text(data.message));
});
I added the div
so that each message can be styled appropriately...
But your server side should have nothing to do with this escaping.
Now, you could decide to filter out anything that looks like HTML on the server, which would be known as Filtering (and either replace it away, or reject it). But definitely do not escape it!
本文标签: javascriptSecure Nodejs chat (avoid XSS)Stack Overflow
版权声明:本文标题:javascript - Secure Node.js chat (avoid XSS) - Stack Overflow 内容由网友自发贡献,该文观点仅代表作者本人, 转载请联系作者并注明出处:http://www.betaflare.com/web/1743785648a2538636.html, 本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容,一经查实,本站将立刻删除。
发表评论