in reply to Re^2: Removing malicious HTML entities (now with more questions!)
in thread Removing malicious HTML entities (now with more questions!)
You should always plan to use it with CGI scripts
The trick to untaint data, as far as I am aware, is to ensure your data is correct . i.e. do data validation. Usually this means using (tight) regexps to ensure the user input doesn't go outside expected bounds.
From what I have read, if you are entering anything into a db then you might want to SQL-escape it too so that people can't hijack your database and delete everything.
HTML::Entites will help display stuff that might otherwise break your web page - what's left that can beak your db?
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^4: Removing malicious HTML entities (now with more questions!)
by Lawliet (Curate) on Aug 18, 2008 at 02:28 UTC | |
by LesleyB (Friar) on Aug 18, 2008 at 10:56 UTC | |
|
Re^4: Removing malicious HTML entities (now with more questions!)
by techcode (Hermit) on Aug 19, 2008 at 21:53 UTC | |
by LesleyB (Friar) on Aug 20, 2008 at 09:35 UTC | |
by techcode (Hermit) on Aug 27, 2008 at 12:07 UTC | |
by graff (Chancellor) on Sep 06, 2008 at 16:36 UTC | |
by techcode (Hermit) on Sep 08, 2008 at 12:00 UTC |