Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 589
  • Last Modified:

How to Correctly Sanitize HTML Mail

Hi!

Was wondering how to correctly sanitize the body of a HTML mail before sending...
Plain-text is no problem, but not sure about HTML...

Thanks!
-Julian.
0
Julian Matz
Asked:
Julian Matz
  • 4
  • 3
  • 2
1 Solution
 
RoonaanCommented:
Html email is just like a plain old html page you would load from the internet.

You need however make sure that:
- You use absolute paths with images and links
- use inline styles (style="") rather than stylesheets in the head(<style></style> or <link />)

Or isn't this what you mean?

-r-
0
 
Julian MatzJoint ChairpersonAuthor Commented:
Hi Roonaan,

I meant in regard to security... I was told never to use stripslashes() for example, but cannot think of an alternative...
0
 
RoonaanCommented:
You would need to use a regular expression first to strip out <style> and <script> blocks.

Then you can use stripslashes to pass out any tags you don't want anyhow, like <pre> or <font> etc.

You would then probably need to use a regular expression to parse out any unwanted attributes to elements you dó want to allow. Like for example onclick or other javascript events.

-r-
0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
ray-solomonCommented:
Well, you can simply include a single sanitizing script and call it easily. I use this in every script that has a form because it just works. Thanks to the OWASP project for creating this one.

read this post:
http://www.antionline.com/showthread.php?s=&threadid=264685
0
 
ray-solomonCommented:
Just use the HTML flag to filter the body of the email before sending it, something like this:

include('sanitize.inc.php');

$Flags = HTML;

$sanitized_body = sanitize($unsanitized_email_body, $Flags);
0
 
Julian MatzJoint ChairpersonAuthor Commented:
Thanks!

Apart from maybe entering some malicious HTML or JavaScript, there's nothing anyone can do to manipulate the mail() function or anything server-side, is there? I mean the way it's possible with the subject header for example...
0
 
ray-solomonCommented:
For starters, you can add a Captcha, so someone has to type what a picture shows before submitting the form.

I would also record ip's that submit the form and disallow the ip's that submit 3 times or more. This could be easily implemented in your form with MySQL and PHP.

Here is just one article that shows how to make a captcha work.
http://codegrrl.com/!/scripts/view/nlphpmail/

0
 
Julian MatzJoint ChairpersonAuthor Commented:
ray-solomon, I know about Captchas, but it's not what I meant. Sorry if I wasn't clear...
Basically I'm wondering if there's anything (characters or commands) a user can add to the mail body through a text-area input field to manipulate the headers -- like it can be done with the subject line by adding new line characters or something (I think).
0
 
ray-solomonCommented:
It depends on how poorly the php script is created. If a script uses global variables to pass information to the mail function without sanitizing and verifying the variables before the mail function processes it, then yes, it can be used to spoof email headers and spam anyone.

For example:

Anyone can easily change the value of any of these variables if the variable name or input box name is known by passing the proper vaiables to the script.

mail($to, $subject, $message, $headers);

I found a website that can explain this better:
http://www.securephpwiki.com/index.php/Email_Injection

Server commands can be executed through the mail function along to shell vulnerabilities or manipulate the headers being sent to the sendmail server. Here is an old proof of concept that used to work. Of course, this does not work anymore, but that isn't to say it is completely safe to use this function.
http://marc.theaimsgroup.com/?l=bugtraq&m=103011916928204

Hopefully you will learn that you can never trust input from anyone. Everything should be filtered and verified. If you take a look at other email services like msn, yahoo, excite..., there is a lot of verification that the user has to go through when signing up these days. I would suggest reading this website for more question on php and security: http://www.securephpwiki.com/index.php/Main_Page
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

  • 4
  • 3
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now