123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256 |
- <?php
- /**
- * @package Grav\Common
- *
- * @copyright Copyright (c) 2015 - 2021 Trilby Media, LLC. All rights reserved.
- * @license MIT License; see LICENSE file for details.
- */
- namespace Grav\Common;
- use enshrined\svgSanitize\Sanitizer;
- use Exception;
- use Grav\Common\Config\Config;
- use Grav\Common\Filesystem\Folder;
- use Grav\Common\Page\Pages;
- use function chr;
- use function count;
- use function is_array;
- use function is_string;
- /**
- * Class Security
- * @package Grav\Common
- */
- class Security
- {
- /**
- * Sanitize SVG string for XSS code
- *
- * @param string $svg
- * @return string
- */
- public static function sanitizeSvgString(string $svg): string
- {
- if (Grav::instance()['config']->get('security.sanitize_svg')) {
- $sanitizer = new Sanitizer();
- $sanitized = $sanitizer->sanitize($svg);
- if (is_string($sanitized)) {
- $svg = $sanitized;
- }
- }
- return $svg;
- }
- /**
- * Sanitize SVG for XSS code
- *
- * @param string $file
- * @return void
- */
- public static function sanitizeSVG(string $file): void
- {
- if (file_exists($file) && Grav::instance()['config']->get('security.sanitize_svg')) {
- $sanitizer = new Sanitizer();
- $original_svg = file_get_contents($file);
- $clean_svg = $sanitizer->sanitize($original_svg);
- // Quarantine bad SVG files and throw exception
- if ($clean_svg !== false ) {
- file_put_contents($file, $clean_svg);
- } else {
- $quarantine_file = basename($file);
- $quarantine_dir = 'log://quarantine';
- Folder::mkdir($quarantine_dir);
- file_put_contents("$quarantine_dir/$quarantine_file", $original_svg);
- unlink($file);
- throw new Exception('SVG could not be sanitized, it has been moved to the logs/quarantine folder');
- }
- }
- }
- /**
- * Detect XSS code in Grav pages
- *
- * @param Pages $pages
- * @param bool $route
- * @param callable|null $status
- * @return array
- */
- public static function detectXssFromPages(Pages $pages, $route = true, callable $status = null)
- {
- $routes = $pages->routes();
- // Remove duplicate for homepage
- unset($routes['/']);
- $list = [];
- // This needs Symfony 4.1 to work
- $status && $status([
- 'type' => 'count',
- 'steps' => count($routes),
- ]);
- foreach ($routes as $path) {
- $status && $status([
- 'type' => 'progress',
- ]);
- try {
- $page = $pages->get($path);
- // call the content to load/cache it
- $header = (array) $page->header();
- $content = $page->value('content');
- $data = ['header' => $header, 'content' => $content];
- $results = Security::detectXssFromArray($data);
- if (!empty($results)) {
- if ($route) {
- $list[$page->route()] = $results;
- } else {
- $list[$page->filePathClean()] = $results;
- }
- }
- } catch (Exception $e) {
- continue;
- }
- }
- return $list;
- }
- /**
- * Detect XSS in an array or strings such as $_POST or $_GET
- *
- * @param array $array Array such as $_POST or $_GET
- * @param array|null $options Extra options to be passed.
- * @param string $prefix Prefix for returned values.
- * @return array Returns flatten list of potentially dangerous input values, such as 'data.content'.
- */
- public static function detectXssFromArray(array $array, string $prefix = '', array $options = null)
- {
- if (null === $options) {
- $options = static::getXssDefaults();
- }
- $list = [];
- foreach ($array as $key => $value) {
- if (is_array($value)) {
- $list[] = static::detectXssFromArray($value, $prefix . $key . '.', $options);
- }
- if ($result = static::detectXss($value, $options)) {
- $list[] = [$prefix . $key => $result];
- }
- }
- if (!empty($list)) {
- return array_merge(...$list);
- }
- return $list;
- }
- /**
- * Determine if string potentially has a XSS attack. This simple function does not catch all XSS and it is likely to
- *
- * return false positives because of it tags all potentially dangerous HTML tags and attributes without looking into
- * their content.
- *
- * @param string|null $string The string to run XSS detection logic on
- * @param array|null $options
- * @return string|null Type of XSS vector if the given `$string` may contain XSS, false otherwise.
- *
- * Copies the code from: https://github.com/symphonycms/xssfilter/blob/master/extension.driver.php#L138
- */
- public static function detectXss($string, array $options = null): ?string
- {
- // Skip any null or non string values
- if (null === $string || !is_string($string) || empty($string)) {
- return null;
- }
- if (null === $options) {
- $options = static::getXssDefaults();
- }
- $enabled_rules = (array)($options['enabled_rules'] ?? null);
- $dangerous_tags = (array)($options['dangerous_tags'] ?? null);
- if (!$dangerous_tags) {
- $enabled_rules['dangerous_tags'] = false;
- }
- $invalid_protocols = (array)($options['invalid_protocols'] ?? null);
- if (!$invalid_protocols) {
- $enabled_rules['invalid_protocols'] = false;
- }
- $enabled_rules = array_filter($enabled_rules, static function ($val) { return !empty($val); });
- if (!$enabled_rules) {
- return null;
- }
- // Keep a copy of the original string before cleaning up
- $orig = $string;
- // URL decode
- $string = urldecode($string);
- // Convert Hexadecimals
- $string = (string)preg_replace_callback('!(&#|\\\)[xX]([0-9a-fA-F]+);?!u', function ($m) {
- return chr(hexdec($m[2]));
- }, $string);
- // Clean up entities
- $string = preg_replace('!(�+[0-9]+)!u', '$1;', $string);
- // Decode entities
- $string = html_entity_decode($string, ENT_NOQUOTES, 'UTF-8');
- // Strip whitespace characters
- $string = preg_replace('!\s!u', '', $string);
- // Set the patterns we'll test against
- $patterns = [
- // Match any attribute starting with "on" or xmlns
- 'on_events' => '#(<[^>]+[[a-z\x00-\x20\"\'\/])([\s\/]on|\sxmlns)[a-z].*=>?#iUu',
- // Match javascript:, livescript:, vbscript:, mocha:, feed: and data: protocols
- 'invalid_protocols' => '#(' . implode('|', array_map('preg_quote', $invalid_protocols, ['#'])) . '):\S.*?#iUu',
- // Match -moz-bindings
- 'moz_binding' => '#-moz-binding[a-z\x00-\x20]*:#u',
- // Match style attributes
- 'html_inline_styles' => '#(<[^>]+[a-z\x00-\x20\"\'\/])(style=[^>]*(url\:|x\:expression).*)>?#iUu',
- // Match potentially dangerous tags
- 'dangerous_tags' => '#</*(' . implode('|', array_map('preg_quote', $dangerous_tags, ['#'])) . ')[^>]*>?#ui'
- ];
- // Iterate over rules and return label if fail
- foreach ($patterns as $name => $regex) {
- if (!empty($enabled_rules[$name])) {
- if (preg_match($regex, $string) || preg_match($regex, $orig)) {
- return $name;
- }
- }
- }
- return false;
- }
- public static function getXssDefaults(): array
- {
- /** @var Config $config */
- $config = Grav::instance()['config'];
- return [
- 'enabled_rules' => $config->get('security.xss_enabled'),
- 'dangerous_tags' => array_map('trim', $config->get('security.xss_dangerous_tags')),
- 'invalid_protocols' => array_map('trim', $config->get('security.xss_invalid_protocols')),
- ];
- }
- }
|