HtmlSanitizer 9.1.891-beta
HtmlSanitizer
HtmlSanitizer is a .NET library for cleaning HTML fragments and documents from constructs that can lead to XSS attacks. It uses AngleSharp to parse, manipulate, and render HTML and CSS.
Because HtmlSanitizer is based on a robust HTML parser it can also shield you from deliberate or accidental "tag poisoning" where invalid HTML in one fragment can corrupt the whole document leading to broken layout or style.
In order to facilitate different use cases, HtmlSanitizer can be customized at several levels:
- Configure allowed HTML tags through the property
AllowedTags. All other tags will be stripped. - Configure allowed HTML attributes through the property
AllowedAttributes. All other attributes will be stripped. - Configure allowed CSS property names through the property
AllowedCssProperties. All other styles will be stripped. - Configure allowed CSS at-rules through the property
AllowedAtRules. All other at-rules will be stripped. - Configure allowed URI schemes through the property
AllowedSchemes. All other URIs will be stripped. - Configure HTML attributes that contain URIs (such as "src", "href" etc.) through the property
UriAttributes. - Provide a base URI that will be used to resolve relative URIs against.
- Cancelable events are raised before a tag, attribute, or style is removed.
Usage
Install the HtmlSanitizer NuGet package. Then:
using Ganss.Xss;
var sanitizer = new HtmlSanitizer();
var html = @"<script>alert('xss')</script><div onload=""alert('xss')"""
+ @"style=""background-color: rgba(0, 0, 0, 1)"">Test<img src=""test.png"""
+ @"style=""background-image: url(javascript:alert('xss')); margin: 10px""></div>";
var sanitized = sanitizer.Sanitize(html, "https://www.example.com");
var expected = @"<div style=""background-color: rgba(0, 0, 0, 1)"">"
+ @"Test<img src=""https://www.example.com/test.png"" style=""margin: 10px""></div>";
Assert.Equal(expected, sanitized);
There's an online demo, plus there's also a .NET Fiddle you can play with.
More example code and a description of possible options can be found in the Wiki.
Tags allowed by default
a,
abbr,
acronym,
address,
area,
article,
aside,
b,
bdi,
big,
blockquote,
body
br,
button,
caption,
center,
cite,
code,
col,
colgroup,
data,
datalist,
dd,
del,
details,
dfn,
dir,
div,
dl,
dt,
em,
fieldset,
figcaption,
figure,
font,
footer,
form,
h1,
h2,
h3,
h4,
h5,
h6,
head,
header,
hr,
html,
i,
img,
input,
ins,
kbd,
keygen,
label,
legend,
li,
main,
map,
mark,
menu,
menuitem,
meter,
nav,
ol,
optgroup,
option,
output,
p,
pre,
progress,
q,
rp,
rt,
ruby,
s,
samp,
section,
select,
small,
span,
strike,
strong,
sub,
summary,
sup,
table,
tbody,
td,
textarea,
tfoot,
th,
thead,
time,
tr,
tt,
u,
ul,
var,
wbr
Attributes allowed by default
abbr,
accept-charset,
accept,
accesskey,
action,
align,
alt,
autocomplete,
autosave,
axis,
bgcolor,
border,
cellpadding,
cellspacing,
challenge,
char,
charoff,
charset,
checked,
cite,
clear,
color,
cols,
colspan,
compact,
contenteditable,
coords,
datetime,
dir,
disabled,
draggable,
dropzone,
enctype,
for,
frame,
headers,
height,
high,
href,
hreflang,
hspace,
ismap,
keytype,
label,
lang,
list,
longdesc,
low,
max,
maxlength,
media,
method,
min,
multiple,
name,
nohref,
noshade,
novalidate,
nowrap,
open,
optimum,
pattern,
placeholder,
prompt,
pubdate,
radiogroup,
readonly,
rel,
required,
rev,
reversed,
rows,
rowspan,
rules,
scope,
selected,
shape,
size,
span,
spellcheck,
src,
start,
step,
style,
summary,
tabindex,
target,
title,
type,
usemap,
valign,
value,
vspace,
width,
wrap
Note: to prevent classjacking and interference with classes where the sanitized fragment is to be integrated, the class attribute is disallowed by default.
It can be added as follows:
var sanitizer = new HtmlSanitizer();
sanitizer.AllowedAttributes.Add("class");
var sanitized = sanitizer.Sanitize(html);
CSS properties allowed by default
align-content,
align-items,
align-self,
all,
animation,
animation-delay,
animation-direction,
animation-duration,
animation-fill-mode,
animation-iteration-count,
animation-name,
animation-play-state,
animation-timing-function,
backface-visibility,
background,
background-attachment,
background-blend-mode,
background-clip,
background-color,
background-image,
background-origin,
background-position,
background-position-x,
background-position-y,
background-repeat,
background-repeat-x,
background-repeat-y,
background-size,
border,
border-bottom,
border-bottom-color,
border-bottom-left-radius,
border-bottom-right-radius,
border-bottom-style,
border-bottom-width,
border-collapse,
border-color,
border-image,
border-image-outset,
border-image-repeat,
border-image-slice,
border-image-source,
border-image-width,
border-left,
border-left-color,
border-left-style,
border-left-width,
border-radius,
border-right,
border-right-color,
border-right-style,
border-right-width,
border-spacing,
border-style,
border-top,
border-top-color,
border-top-left-radius,
border-top-right-radius,
border-top-style,
border-top-width,
border-width,
bottom,
box-decoration-break,
box-shadow,
box-sizing,
break-after,
break-before,
break-inside,
caption-side,
caret-color,
clear,
clip,
color,
column-count,
column-fill,
column-gap,
column-rule,
column-rule-color,
column-rule-style,
column-rule-width,
column-span,
column-width,
columns,
content,
counter-increment,
counter-reset,
cursor,
direction,
display,
empty-cells,
filter,
flex,
flex-basis,
flex-direction,
flex-flow,
flex-grow,
flex-shrink,
flex-wrap,
float,
font,
font-family,
font-feature-settings,
font-kerning,
font-language-override,
font-size,
font-size-adjust,
font-stretch,
font-style,
font-synthesis,
font-variant,
font-variant-alternates,
font-variant-caps,
font-variant-east-asian,
font-variant-ligatures,
font-variant-numeric,
font-variant-position,
font-weight,
gap,
grid,
grid-area,
grid-auto-columns,
grid-auto-flow,
grid-auto-rows,
grid-column,
grid-column-end,
grid-column-gap,
grid-column-start,
grid-gap,
grid-row,
grid-row-end,
grid-row-gap,
grid-row-start,
grid-template,
grid-template-areas,
grid-template-columns,
grid-template-rows,
hanging-punctuation,
height,
hyphens,
image-rendering,
isolation,
justify-content,
left,
letter-spacing,
line-break,
line-height,
list-style,
list-style-image,
list-style-position,
list-style-type,
margin,
margin-bottom,
margin-left,
margin-right,
margin-top,
mask,
mask-clip,
mask-composite,
mask-image,
mask-mode,
mask-origin,
mask-position,
mask-repeat,
mask-size,
mask-type,
max-height,
max-width,
min-height,
min-width,
mix-blend-mode,
object-fit,
object-position,
opacity,
order,
orphans,
outline,
outline-color,
outline-offset,
outline-style,
outline-width,
overflow,
overflow-wrap,
overflow-x,
overflow-y,
padding,
padding-bottom,
padding-left,
padding-right,
padding-top,
page-break-after,
page-break-before,
page-break-inside,
perspective,
perspective-origin,
pointer-events,
position,
quotes,
resize,
right,
row-gap,
scroll-behavior,
tab-size,
table-layout,
text-align,
text-align-last,
text-combine-upright,
text-decoration,
text-decoration-color,
text-decoration-line,
text-decoration-skip,
text-decoration-style,
text-indent,
text-justify,
text-orientation,
text-overflow,
text-shadow,
text-transform,
text-underline-position,
top,
transform,
transform-origin,
transform-style,
transition,
transition-delay,
transition-duration,
transition-property,
transition-timing-function,
unicode-bidi,
user-select,
vertical-align,
visibility,
white-space,
widows,
width,
word-break,
word-spacing,
word-wrap,
writing-mode,
z-index
CSS at-rules allowed by default
namespace, style
style refers to style declarations within other at-rules such as @media. Disallowing @namespace while allowing other types of at-rules can lead to errors.
Property declarations in @font-face and @viewport are not sanitized.
Note: the style tag is disallowed by default.
URI schemes allowed by default
http, https
Note: Protocol-relative URLs (e.g. //github.com) are allowed by default (as are other relative URLs).
to allow mailto: links:
sanitizer.AllowedSchemes.Add("mailto");
Default attributes that contain URIs
action, background, dynsrc, href, lowsrc, src
Thread safety
The Sanitize() and SanitizeDocument() methods are thread-safe, i.e. you can use these methods on a single shared instance from different threads provided you do not simultaneously set instance or static properties. A typical use case is that you prepare an HtmlSanitizer instance once (i.e. set desired properties such as AllowedTags etc.) from a single thread, then call Sanitize()/SanitizeDocument() from multiple threads.
Text content not necessarily preserved as-is
Please note that as the input is parsed by AngleSharp's HTML parser and then rendered back out, you cannot expect the text content to be preserved exactly as it was input, even if no elements or attributes were removed. Examples:
4 < 5becomes4 < 5<SPAN>test</p>becomes<span>test<p></p></span><span title='test'>test</span>becomes<span title="test">test</span>
On the other hand, although some broken HTML is fixed by the parser, the output might still contain invalid HTML. Examples:
<div><li>test</li></div><ul><br><li>test</li></ul><h3><p>test</p></h3>
License
Showing the top 20 packages that depend on HtmlSanitizer.
| Packages | Downloads |
|---|---|
|
Masuit.Tools.Core
包含一些常用的操作类,大都是静态类,加密解密,反射操作,硬件信息,字符串扩展方法,日期时间扩展操作,大文件拷贝,图像裁剪,html处理,验证码、NoSql等常用封装。
示例代码:
1.检验字符串是否是Email
bool isEmail="1170397736@qq.com".MatchEmail();
2.获取线程内唯一对象
CallContext<T>.GetData("db");
3.获取当前请求上下文
var context=HttpContext2.Current;
4.获取IP详细地理信息
var address="114.114.114.114".GetPhysicsAddress();
5.大文件操作
FileStream fs = new FileStream(@"D:\boot.vmdk", FileMode.OpenOrCreate, FileAccess.ReadWrite);
{
//fs.CopyToFile(@"D:\1.bak");//同步复制大文件
fs.CopyToFileAsync(@"D:\1.bak");//异步复制大文件
string md5 = fs.GetFileMD5Async().Result;//异步获取文件的MD5
}
6.html的防XSS处理:
string html = @"<link href="/Content/font-awesome/css" rel="stylesheet" />
<!--[if IE 7]>
<link href='/Content/font-awesome-ie7.min.css' rel='stylesheet'/>
<![endif]-->
<script src="/Scripts/modernizr"></script>
<div id="searchBox" role="search">
<form action="/packages" method="get">
<span class="user-actions"><a href="/users/account/LogOff">退出</a></span>
<input name="q" id="searchBoxInput" />
<input id="searchBoxSubmit" type="submit" value="Submit" />
</form>
</div>";
string s = html.HtmlSantinizerStandard();//清理后:<div><span><a href="/users/account/LogOff">退出</a></span></div>
|
1 |
|
Masuit.Tools.Core
包含一些常用的操作类,大都是静态类,加密解密,反射操作,Excel简单导出,权重随机筛选算法,分布式短id,表达式树,linq扩展,文件压缩,多线程下载和FTP客户端,硬件信息,字符串扩展方法,日期时间扩展操作,中国农历,大文件拷贝,图像裁剪,验证码,断点续传,集合扩展等常用封装。
官网教程:https://ldqk.org/55
github:https://github.com/ldqk/Masuit.Tools
|
1 |
|
Masuit.Tools.Core
包含一些常用的操作类,大都是静态类,加密解密,反射操作,硬件信息,字符串扩展方法,日期时间扩展操作,大文件拷贝,图像裁剪,html处理,验证码、NoSql等常用封装。
官网教程:https://masuit.com/55
github:https://github.com/ldqk/Masuit.Tools
|
1 |
|
Masuit.Tools.Core
包含一些常用的操作类,大都是静态类,加密解密,反射操作,硬件信息,字符串扩展方法,日期时间扩展操作,大文件拷贝,图像裁剪,html处理,验证码、NoSql等常用封装。
示例代码:
1.检验字符串是否是Email
bool isEmail="1170397736@qq.com".MatchEmail();
2.获取CPU核心数
int core = SystemInfo.GetCpuCount();
3.大文件操作
FileStream fs = new FileStream(@"D:\boot.vmdk", FileMode.OpenOrCreate, FileAccess.ReadWrite);
{
//fs.CopyToFile(@"D:\1.bak");//同步复制大文件
fs.CopyToFileAsync(@"D:\1.bak");//异步复制大文件
string md5 = fs.GetFileMD5Async().Result;//异步获取文件的MD5
}
4.html的防XSS处理:
string html = @"<link href="/Content/font-awesome/css" rel="stylesheet" /><!--[if IE 7]>
<link href='/Content/font-awesome-ie7.min.css' rel='stylesheet'/>
<![endif]--><script src="/Scripts/modernizr"></script><div id="searchBox" role="search"><form action="/packages" method="get"><span class="user-actions"><a href="/users/account/LogOff">退出</a></span><input name="q" id="searchBoxInput" /><input id="searchBoxSubmit" type="submit" value="Submit" /></form></div>";
string s = html.HtmlSantinizerStandard();//清理后:<div><span><a href="/users/account/LogOff">退出</a></span></div>
5.整理操作系统的内存:
Windows.ClearMemorySilent();
......
|
1 |
.NET Framework 4.6.2
- AngleSharp (>= 1.4.0)
- AngleSharp.Css (>= 1.0.0-beta.159)
- System.Collections.Immutable (>= 10.0.0)
- System.ValueTuple (>= 4.6.1)
.NET Framework 4.7
- AngleSharp (>= 1.4.0)
- AngleSharp.Css (>= 1.0.0-beta.159)
- System.Collections.Immutable (>= 10.0.0)
.NET 8.0
- AngleSharp (>= 1.4.0)
- AngleSharp.Css (>= 1.0.0-beta.159)
.NET Standard 2.0
- AngleSharp (>= 1.4.0)
- AngleSharp.Css (>= 1.0.0-beta.159)
- System.Collections.Immutable (>= 10.0.0)
| Version | Downloads | Last updated |
|---|---|---|
| 9.1.891-beta | 1 | 01/10/2026 |
| 9.1.887-beta | 1 | 01/10/2026 |
| 9.1.885-beta | 1 | 01/10/2026 |
| 9.1.882-beta | 1 | 01/10/2026 |
| 9.1.878-beta | 1 | 01/10/2026 |
| 9.0.889 | 1 | 01/10/2026 |
| 9.0.886 | 1 | 01/10/2026 |
| 9.0.884 | 1 | 01/10/2026 |
| 9.0.881 | 1 | 01/10/2026 |
| 9.0.876 | 1 | 01/10/2026 |
| 9.0.873 | 1 | 01/10/2026 |
| 8.2.871-beta | 1 | 01/10/2026 |
| 8.1.870 | 1 | 01/10/2026 |
| 8.1.866-beta | 1 | 01/10/2026 |
| 8.1.860-beta | 1 | 01/10/2026 |
| 8.1.844-beta | 1 | 01/10/2026 |
| 8.1.839-beta | 1 | 01/10/2026 |
| 8.1.812-beta | 1 | 01/10/2026 |
| 8.1.796-beta | 1 | 01/10/2026 |
| 8.1.748-beta | 1 | 01/10/2026 |
| 8.1.747-beta | 1 | 01/10/2026 |
| 8.1.745-beta | 1 | 01/10/2026 |
| 8.1.722-beta | 1 | 01/10/2026 |
| 8.1.719-beta | 1 | 01/10/2026 |
| 8.1.717-beta | 1 | 01/10/2026 |
| 8.0.865 | 1 | 01/10/2026 |
| 8.0.843 | 1 | 01/10/2026 |
| 8.0.838 | 1 | 01/10/2026 |
| 8.0.811 | 1 | 01/10/2026 |
| 8.0.795 | 1 | 01/10/2026 |
| 8.0.746 | 1 | 01/10/2026 |
| 8.0.744 | 1 | 01/10/2026 |
| 8.0.723 | 1 | 01/10/2026 |
| 8.0.718 | 1 | 01/10/2026 |
| 8.0.692 | 1 | 01/10/2026 |
| 8.0.691-beta | 1 | 01/10/2026 |
| 8.0.690-beta | 1 | 01/10/2026 |
| 8.0.645 | 1 | 01/10/2026 |
| 8.0.601 | 1 | 01/10/2026 |
| 7.1.542 | 1 | 01/10/2026 |
| 7.1.512 | 1 | 01/10/2026 |
| 7.1.509 | 1 | 01/10/2026 |
| 7.1.488 | 1 | 01/10/2026 |
| 7.1.475 | 1 | 01/10/2026 |
| 7.0.473 | 1 | 01/10/2026 |
| 7.0.470-beta | 1 | 01/10/2026 |
| 6.0.453 | 1 | 01/10/2026 |
| 6.0.441 | 1 | 01/10/2026 |
| 6.0.437 | 1 | 01/10/2026 |
| 6.0.430-beta | 1 | 01/10/2026 |
| 6.0.423-beta | 1 | 01/10/2026 |
| 6.0.409-beta | 1 | 01/10/2026 |
| 5.0.404 | 1 | 01/10/2026 |
| 5.0.376 | 1 | 01/10/2026 |
| 5.0.372 | 1 | 01/10/2026 |