Practical .NET

Accept HTML and Script from Your Web Pages

Accept HTML and Script from Your Web Pages

By default, ASP.NET prevents users from entering HTML and Script into your page's textboxes. You can turn that off if you want (and, potentially, open your site to various hacks), but you'll have to decide how much exposure you want.

You can turn off checking for HTML on a property-by-property basis by decorating properties in your Model object (SampleInput, in my example), with the AllowHtml attribute. This turns off validation for elements generated from the FormattedText property:

Public Class SampleInput
  <AllowHtml>
  Public Property FormattedText As String

Alternatively, you can decorate your Action method with the ValidateInput attribute, passing False, to turn off validation for the whole Action method:

<ValidateInput(False)>
Function Index(cust As SampleInput) As ActionResult

The smarter move is probably to just turn off validation for the properties involved.

Be warned: It doesn't take much to confuse this process. I've discovered that having another element on the page that uses (for example) the Remote attribute defeats both AllowHtml and ValidateInput.

You'll also want to examine the data returned to your Action method to make sure that it only contains HTML that you're willing to accept (probably formatting tags like <em> or <i>) and doesn't contain tags you don't want (for example, <link> or <script<). The safest solution is probably to count all the tags in your input (such as count all the </ or /> strings) and then count the number of "acceptable" tags (the number <em and <i strings). If the two numbers are different, reject the input.

About the Author

Peter Vogel is a system architect and principal in PH&V Information Services. PH&V provides full-stack consulting from UX design through object modeling to database design. Peter tweets about his VSM columns with the hashtag #vogelarticles. His blog posts on user experience design can be found at http://blog.learningtree.com/tag/ui/.

comments powered by Disqus

Featured

  • IDE Irony: Coding Errors Cause 'Critical' Vulnerability in Visual Studio

    In a larger-than-normal Patch Tuesday, Microsoft warned of a "critical" vulnerability in Visual Studio that should be fixed immediately if automatic patching isn't enabled, ironically caused by coding errors.

  • Building Blazor Applications

    A trio of Blazor experts will conduct a full-day workshop for devs to learn everything about the tech a a March developer conference in Las Vegas keynoted by Microsoft execs and featuring many Microsoft devs.

  • Gradient Boosting Regression Using C#

    Dr. James McCaffrey from Microsoft Research presents a complete end-to-end demonstration of the gradient boosting regression technique, where the goal is to predict a single numeric value. Compared to existing library implementations of gradient boosting regression, a from-scratch implementation allows much easier customization and integration with other .NET systems.

  • Microsoft Execs to Tackle AI and Cloud in Dev Conference Keynotes

    AI unsurprisingly is all over keynotes that Microsoft execs will helm to kick off the Visual Studio Live! developer conference in Las Vegas, March 10-14, which the company described as "a must-attend event."

  • Copilot Agentic AI Dev Environment Opens Up to All

    Microsoft removed waitlist restrictions for some of its most advanced GenAI tech, Copilot Workspace, recently made available as a technical preview.

Subscribe on YouTube