[drupal-devel] Question on valid_input_data()

K B kbahey at gmail.com
Sun May 8 03:41:17 UTC 2005

Actually, after some more tracing, the style element was the not the
culprit. It was the on[a-z]+ regexp. I think this filters the
javascript on* events.

If I have banners that rely on using onclick to redirect to an ad
serving page/script, and these are being blocked by Drupal, what can
be done about them?

On 5/7/05, K B <kbahey at gmail.com> wrote:
> In 4.6 includes/common.inc, in the function valid_input_data(), there
> is a check for various entities. Among these entities, there is a
> check for "style".
> http://drupaldocs.org/api/4.6/function/valid_input_data
> I use the banner module with text ads, and I use things like:
> <div style="some-style-definitions">some text</div>
> This check causes the above to be flagged as a security breach attempt
> and is logged to the watchdog as such.
> http://drupal.org/node/20608#comment-29106
> My question is: Can the "style" element be used in malicious attacks?
> If yes, then how?
> Thanks in advance.

More information about the drupal-devel mailing list