Enhance WAF and dol_sanitizeUrl
This commit is contained in:
parent
bd838d0b8a
commit
45579edd43
@ -613,7 +613,13 @@ function GETPOST($paramname, $check = 'alphanohtml', $method = 0, $filter = null
|
||||
// Sanitizing for special parameters. There is no reason to allow the backtopage parameter to contains an external URL.
|
||||
if ($paramname == 'backtopage' || $paramname == 'backtolist') {
|
||||
$out = str_replace('\\', '/', $out);
|
||||
$out = str_replace(array(':', '@'), '', $out);
|
||||
$out = str_replace(array(':', ';', '@'), '', $out);
|
||||
|
||||
do {
|
||||
$oldstringtoclean = $out;
|
||||
$out = str_ireplace(array('javascript', 'vbscript', '&colon', ':'), '', $out);
|
||||
} while ($oldstringtoclean != $out);
|
||||
|
||||
$out = preg_replace(array('/^[a-z]*\/\/+/i'), '', $out);
|
||||
}
|
||||
|
||||
@ -1010,20 +1016,20 @@ function dol_sanitizePathName($str, $newstr = '_', $unaccent = 1)
|
||||
function dol_sanitizeUrl($stringtoclean, $type = 1)
|
||||
{
|
||||
// We clean string because some hacks try to obfuscate evil strings by inserting non printable chars. Example: 'java(ascci09)scr(ascii00)ipt' is processed like 'javascript' (whatever is place of evil ascii char)
|
||||
// We should use dol_string_nounprintableascii but function is not yet loaded/available
|
||||
// We should use dol_string_nounprintableascii but function may not be yet loaded/available
|
||||
$stringtoclean = preg_replace('/[\x00-\x1F\x7F]/u', '', $stringtoclean); // /u operator makes UTF8 valid characters being ignored so are not included into the replace
|
||||
// We clean html comments because some hacks try to obfuscate evil strings by inserting HTML comments. Example: on<!-- -->error=alert(1)
|
||||
$stringtoclean = preg_replace('/<!--[^>]*-->/', '', $stringtoclean);
|
||||
|
||||
$stringtoclean = str_replace('\\', '/', $stringtoclean);
|
||||
$stringtoclean = str_replace(array(':', '@'), '', $stringtoclean);
|
||||
if ($type == 1) {
|
||||
$stringtoclean = str_replace(array(':', ';', '@'), '', $stringtoclean);
|
||||
}
|
||||
|
||||
do {
|
||||
$oldstringtoclean = $stringtoclean;
|
||||
$stringtoclean = str_replace(array('javascript', 'vbscript'), '', $stringtoclean);
|
||||
if ($type == 1) {
|
||||
$stringtoclean = str_replace(array(':', '&colon', ';'), '', $stringtoclean);
|
||||
}
|
||||
|
||||
$stringtoclean = str_ireplace(array('javascript', 'vbscript', '&colon', ':'), '', $stringtoclean);
|
||||
} while ($oldstringtoclean != $stringtoclean);
|
||||
|
||||
if ($type == 1) {
|
||||
@ -6240,10 +6246,11 @@ function dol_string_onlythesehtmltags($stringtoclean, $cleanalsosomestyles = 1,
|
||||
$stringtoclean = str_replace('<!DOCTYPE html>', '__!DOCTYPE_HTML__', $stringtoclean); // Replace DOCTYPE to avoid to have it removed by the strip_tags
|
||||
|
||||
$stringtoclean = dol_string_nounprintableascii($stringtoclean, 0);
|
||||
$stringtoclean = preg_replace('/:/i', ':', $stringtoclean);
|
||||
|
||||
$stringtoclean = preg_replace('/<!--[^>]*-->/', '', $stringtoclean);
|
||||
$stringtoclean = preg_replace('/:|:|:/i', '', $stringtoclean); // refused string ':' encoded (no reason to have it encoded) to lock 'javascript:...'
|
||||
|
||||
$stringtoclean = preg_replace('/:/i', ':', $stringtoclean);
|
||||
$stringtoclean = preg_replace('/:|�+58|:/i', '', $stringtoclean); // refused string ':' encoded (no reason to have a : encoded like this) to disable 'javascript:...'
|
||||
$stringtoclean = preg_replace('/javascript\s*:/i', '', $stringtoclean);
|
||||
|
||||
$temp = strip_tags($stringtoclean, $allowed_tags_string);
|
||||
@ -6256,7 +6263,7 @@ function dol_string_onlythesehtmltags($stringtoclean, $cleanalsosomestyles = 1,
|
||||
}
|
||||
|
||||
// Remove 'javascript:' that we should not find into a text with
|
||||
// Warning: This is not reliable to fight against obfuscated javascript, there is a lot of other solution to include js into a common html tag (only filtered by the GETPOST).
|
||||
// Warning: This is not reliable to fight against obfuscated javascript, there is a lot of other solution to include js into a common html tag (only filtered by a GETPOST(.., powerfullfilter)).
|
||||
if ($cleanalsojavascript) {
|
||||
$temp = preg_replace('/javascript\s*:/i', '', $temp);
|
||||
}
|
||||
|
||||
@ -68,7 +68,7 @@ function testSqlAndScriptInject($val, $type)
|
||||
$oldval = $val;
|
||||
$val = html_entity_decode($val, ENT_QUOTES | ENT_HTML5);
|
||||
} while ($oldval != $val);
|
||||
//print "after decoding $val\n";
|
||||
//print "after decoding $val\n";
|
||||
|
||||
// We clean string because some hacks try to obfuscate evil strings by inserting non printable chars. Example: 'java(ascci09)scr(ascii00)ipt' is processed like 'javascript' (whatever is place of evil ascii char)
|
||||
// We should use dol_string_nounprintableascii but function is not yet loaded/available
|
||||
|
||||
@ -455,7 +455,7 @@ class Productcustomerprice extends CommonObject
|
||||
$line->socname = $obj->socname;
|
||||
$line->prodref = $obj->prodref;
|
||||
|
||||
$this->lines [] = $line;
|
||||
$this->lines[] = $line;
|
||||
}
|
||||
$this->db->free($resql);
|
||||
|
||||
|
||||
@ -207,7 +207,7 @@ class SecurityTest extends PHPUnit\Framework\TestCase
|
||||
|
||||
$test = 'javascript&colon;alert(1)';
|
||||
$result=testSqlAndScriptInject($test, 0);
|
||||
$this->assertEquals($expectedresult, $result, 'Error on testSqlAndScriptInject expected 1b');
|
||||
$this->assertEquals($expectedresult, $result, 'Error on testSqlAndScriptInject expected 1a');
|
||||
|
||||
$test="<img src='1.jpg' onerror =javascript:alert('XSS')>";
|
||||
$result=testSqlAndScriptInject($test, 0);
|
||||
@ -327,7 +327,8 @@ class SecurityTest extends PHPUnit\Framework\TestCase
|
||||
$_POST["param10"]='is_object($object) ? ($object->id < 10 ? round($object->id / 2, 2) : (2 * $user->id) * (int) substr($mysoc->zip, 1, 2)) : \'<abc>objnotdefined\'';
|
||||
$_POST["param11"]=' Name <email@email.com> ';
|
||||
$_POST["param12"]='<!DOCTYPE html><html>aaa</html>';
|
||||
$_POST["param13"]='javascript%26colon%26%23x3B%3Balert(1)';
|
||||
//$_POST["param13"]='javascript%26colon%26%23x3B%3Balert(1)';
|
||||
//$_POST["param14"]='javascripT&javascript#x3a alert(1)';
|
||||
|
||||
$result=GETPOST('id', 'int'); // Must return nothing
|
||||
print __METHOD__." result=".$result."\n";
|
||||
@ -436,6 +437,15 @@ class SecurityTest extends PHPUnit\Framework\TestCase
|
||||
print __METHOD__." result=".$result."\n";
|
||||
$this->assertEquals(trim($_POST["param12"]), $result, 'Test a string with DOCTYPE and restricthtml');
|
||||
|
||||
/*$result=GETPOST("param13", 'alphanohtml');
|
||||
print __METHOD__." result=".$result."\n";
|
||||
$this->assertEquals(trim($_POST["param13"]), $result, 'Test a string and alphanohtml');
|
||||
|
||||
$result=GETPOST("param14", 'alphanohtml');
|
||||
print __METHOD__." result=".$result."\n";
|
||||
$this->assertEquals(trim($_POST["param14"]), $result, 'Test a string and alphanohtml');
|
||||
*/
|
||||
|
||||
// Special test for GETPOST of backtopage or backtolist parameter
|
||||
|
||||
$_POST["backtopage"]='//www.google.com';
|
||||
@ -463,6 +473,11 @@ class SecurityTest extends PHPUnit\Framework\TestCase
|
||||
print __METHOD__." result=".$result."\n";
|
||||
$this->assertEquals('/mydir/mypage.php?aa=a%10a', $result, 'Test for backtopage param');
|
||||
|
||||
$_POST["backtopage"]='javascripT&javascript#javascriptxjavascript3a alert(1)';
|
||||
$result=GETPOST("backtopage");
|
||||
print __METHOD__." result=".$result."\n";
|
||||
$this->assertEquals(' alert(1)', $result, 'Test for backtopage param');
|
||||
|
||||
return $result;
|
||||
}
|
||||
|
||||
@ -674,13 +689,17 @@ class SecurityTest extends PHPUnit\Framework\TestCase
|
||||
$langs=$this->savlangs;
|
||||
$db=$this->savdb;
|
||||
|
||||
$test = 'javascripT&javascript#x3a alert(1)';
|
||||
$result=dol_sanitizeUrl($test);
|
||||
$this->assertEquals(' alert(1)', $result, 'Test on dol_sanitizeUrl A');
|
||||
|
||||
$test = 'javajavascriptscript&cjavascriptolon;alert(1)';
|
||||
$result=dol_sanitizeUrl($test);
|
||||
$this->assertEquals('alert(1)', $result, 'Test on dol_sanitizeUrl');
|
||||
$this->assertEquals('alert(1)', $result, 'Test on dol_sanitizeUrl B');
|
||||
|
||||
$test = '/javas:cript/google.com';
|
||||
$result=dol_sanitizeUrl($test);
|
||||
$this->assertEquals('google.com', $result, 'Test on dol_sanitizeUrl');
|
||||
$this->assertEquals('google.com', $result, 'Test on dol_sanitizeUrl C');
|
||||
}
|
||||
|
||||
/**
|
||||
|
||||
Loading…
Reference in New Issue
Block a user