A potentially dangerous Request.Form value was detected from the client

前端 未结 30 2215
刺人心
刺人心 2020-11-21 05:24

Every time a user posts something containing < or > in a page in my web application, I get this exception thrown.

I don\'t want to go

相关标签:
30条回答
  • 2020-11-21 05:46

    I ended up using JavaScript before each postback to check for the characters you didn't want, such as:

    <asp:Button runat="server" ID="saveButton" Text="Save" CssClass="saveButton" OnClientClick="return checkFields()" />
    
    function checkFields() {
        var tbs = new Array();
        tbs = document.getElementsByTagName("input");
        var isValid = true;
        for (i=0; i<tbs.length; i++) {
            if (tbs(i).type == 'text') {
                if (tbs(i).value.indexOf('<') != -1 || tbs(i).value.indexOf('>') != -1) {
                    alert('<> symbols not allowed.');
                    isValid = false;
                }
            }
        }
        return isValid;
    }
    

    Granted my page is mostly data entry, and there are very few elements that do postbacks, but at least their data is retained.

    0 讨论(0)
  • 2020-11-21 05:47

    Please bear in mind that some .NET controls will automatically HTML encode the output. For instance, setting the .Text property on a TextBox control will automatically encode it. That specifically means converting < into &lt;, > into &gt; and & into &amp;. So be wary of doing this...

    myTextBox.Text = Server.HtmlEncode(myStringFromDatabase); // Pseudo code
    

    However, the .Text property for HyperLink, Literal and Label won't HTML encode things, so wrapping Server.HtmlEncode(); around anything being set on these properties is a must if you want to prevent <script> window.location = "http://www.google.com"; </script> from being output into your page and subsequently executed.

    Do a little experimenting to see what gets encoded and what doesn't.

    0 讨论(0)
  • 2020-11-21 05:48

    If you're just looking to tell your users that < and > are not to be used BUT, you don't want the entire form processed/posted back (and lose all the input) before-hand could you not simply put in a validator around the field to screen for those (and maybe other potentially dangerous) characters?

    0 讨论(0)
  • 2020-11-21 05:49

    I found a solution that uses JavaScript to encode the data, which is decoded in .NET (and doesn't require jQuery).

    • Make the textbox an HTML element (like textarea) instead of an ASP one.
    • Add a hidden field.
    • Add the following JavaScript function to your header.

      function boo() { targetText = document.getElementById("HiddenField1"); sourceText = document.getElementById("userbox"); targetText.value = escape(sourceText.innerText); }

    In your textarea, include an onchange that calls boo():

    <textarea id="userbox"  onchange="boo();"></textarea>
    

    Finally, in .NET, use

    string val = Server.UrlDecode(HiddenField1.Value);
    

    I am aware that this is one-way - if you need two-way you'll have to get creative, but this provides a solution if you cannot edit the web.config

    Here's an example I (MC9000) came up with and use via jQuery:

    $(document).ready(function () {
    
        $("#txtHTML").change(function () {
            var currentText = $("#txtHTML").text();
            currentText = escape(currentText); // Escapes the HTML including quotations, etc
            $("#hidHTML").val(currentText); // Set the hidden field
        });
    
        // Intercept the postback
        $("#btnMyPostbackButton").click(function () {
            $("#txtHTML").val(""); // Clear the textarea before POSTing
                                   // If you don't clear it, it will give you
                                   // the error due to the HTML in the textarea.
            return true; // Post back
        });
    
    
    });
    

    And the markup:

    <asp:HiddenField ID="hidHTML" runat="server" />
    <textarea id="txtHTML"></textarea>
    <asp:Button ID="btnMyPostbackButton" runat="server" Text="Post Form" />
    

    This works great. If a hacker tries to post via bypassing JavaScript, they they will just see the error. You can save all this data encoded in a database as well, then unescape it (on the server side), and parse & check for attacks before displaying elsewhere.

    0 讨论(0)
  • 2020-11-21 05:49

    The other solutions here are nice, however it's a bit of a royal pain in the rear to have to apply [AllowHtml] to every single Model property, especially if you have over 100 models on a decent sized site.

    If like me, you want to turn this (IMHO pretty pointless) feature off site wide you can override the Execute() method in your base controller (if you don't already have a base controller I suggest you make one, they can be pretty useful for applying common functionality).

        protected override void Execute(RequestContext requestContext)
        {
            // Disable requestion validation (security) across the whole site
            ValidateRequest = false;
            base.Execute(requestContext);
        }
    

    Just make sure that you are HTML encoding everything that is pumped out to the views that came from user input (it's default behaviour in ASP.NET MVC 3 with Razor anyway, so unless for some bizarre reason you are using Html.Raw() you shouldn't require this feature.

    0 讨论(0)
  • 2020-11-21 05:51

    You can HTML encode text box content, but unfortunately that won't stop the exception from happening. In my experience there is no way around, and you have to disable page validation. By doing that you're saying: "I'll be careful, I promise."

    0 讨论(0)
提交回复
热议问题