65.9K
CodeProject is changing. Read more.
Home

Dead Simple HTML Sanitizer

starIconstarIconstarIconstarIcon
emptyStarIcon
starIcon

4.75/5 (4 votes)

Jan 17, 2013

CPOL
viewsIcon

35036

downloadIcon

602

A dead simple HTML Sanitizer (and HTML Parser) you can use to clean user HTML input.

Introduction 

This article introduces a dead simple HTML Sanitizer which you can use to clean up user-entered HTML or uploaded HTML documents.

Sanitized:

Html Sanitizer WPF Demo

Original:

Background

One of our systems features a Document Production module which allows users to upload (and save) custom HTML documents which can be downloaded by other user. The problem was that some users kept adding "unsafe" script tags (and other XSS vulnerabilities) in their documents which we had to Sanitize.

Note: I know of the Microsoft Anti-Cross Site Scripting Library but decided to write my own since adding a new reference to the project was out of the question.

Using the code

//
// Sample usage
const string input = "<scriPt>alert(0)</Script>This is the game <SCRIPT>";
var output = HtmlSanitizer.Sanitize(input);
Assert.AreEqual("This is the game ", output); 

Parse the HTML

You can also just parse the HTML document.

//
// Parsing a malfomed HTML document
var input = System.IO.File.ReadAllText("myfile.htm");
var doc = HtmlParser.Parse(input);
Assert.AreEqual(2, doc.ChildNodes.Count);

Tidy the HTML

You can also just tidy the HTML content.

//
// Tidy a malfomed HTML document
var input = "<input type=checkbox value=ON checked>";
var output = HtmlParser.Tidy(input);
Assert.AreEqual("<input type=\"checkbox\" value=\"ON\" checked=\"checked\"/>", output); 

Points of Interest/References

  1. The XML Viewer used in this article was taken from A Simple XML Document Viewer Control
  2. This code has not been tested against extremely malformed HTML so please be careful how you use it.
  3. You can always change the list of unsafe tags and attributes to meet your requirements

History

This is the first revision of the article.