I have a simple question (not for me), ok, at first, please take a look at this:
$msg=preg_replace("/\[b(.*?)\](.*?)\[\/b\]/i", "<b $1>$2</b>", $msg);
Okay, on that regEXP, a $msg will replace any thing found and put it into a new form (I don't know how to explain, how about an example):
It will turn
[b]TEXT[/b]
into
<b>TEXT</b>
Or it will turn
[b style="color: red;" title="HELLO"]TEXT[/b]
into
<b style="color: red;" title="HELLO">TEXT</b>
Here is where the problem springs from, what happen if it turns:
[b onclick="SOME TROJAN SCRIPT"]TEXT[/b]
into
<b onclick="SOME TROJAN SCRIPT">TEXT</b>
And all I want to do is instead of replace all attributes go after [b attribute1 attribute2...attributeN], the function will remain those attributes AS LONG AS THEY DO NOT START WITH on (like onClick, onMouseOver...).
I appreciate for any suggestion ^^! Thank you guys in advanced...
This will be far easier to whitelist than blacklist, particularly because of the myriad of ways malicious users can obfuscate the javascript. I would make a list of acceptable entries and work from there instead. Yes, I realize that they could technically have any css entry there, but (1) you're the one who wants to allow users to create their own HTML, practically inviting all sorts of XSS headaches, and (2) this is only a
<b>
tag, so you should be OK with a small subset of allowable css commands.