| Total Complexity | 59 |
| Total Lines | 734 |
| Duplicated Lines | 0 % |
| Changes | 1 | ||
| Bugs | 0 | Features | 0 |
Complex classes like InputClean often do a lot of different things. To break such a class down, we need to identify a cohesive component within that class. A common approach to find such a component is to look for fields/methods that share the same prefixes, or suffixes.
Once you have determined the fields that belong together, you can apply the Extract Class refactoring. If the component makes sense as a sub-class, Extract Subclass is also a candidate, and is often faster.
While breaking up the class, it is a good idea to analyze how other classes use InputClean, and based on these observations, apply Extract Interface, too.
| 1 | <?php |
||
| 56 | class InputClean |
||
| 57 | { |
||
| 58 | /** |
||
| 59 | * The list of invalid filename chars |
||
| 60 | * @var array<string> |
||
| 61 | */ |
||
| 62 | protected array $invalidFilenameChars = [ |
||
| 63 | '../', '<!--', '-->', '<', '>', |
||
| 64 | '\'', '"', '&', '$', '#', |
||
| 65 | '{', '}', '[', ']', '=', |
||
| 66 | ';', '?', '%20', '%22', |
||
| 67 | '%3c', // < |
||
| 68 | '%253c', // < |
||
| 69 | '%3e', // > |
||
| 70 | '%0e', // > |
||
| 71 | '%28', // ( |
||
| 72 | '%29', // ) |
||
| 73 | '%2528', // ( |
||
| 74 | '%26', // & |
||
| 75 | '%24', // $ |
||
| 76 | '%3f', // ? |
||
| 77 | '%3b', // ; |
||
| 78 | '%3d' // = |
||
| 79 | ]; |
||
| 80 | |||
| 81 | /** |
||
| 82 | * The character set to use |
||
| 83 | * @var string |
||
| 84 | */ |
||
| 85 | protected string $charset = 'UTF-8'; |
||
| 86 | |||
| 87 | /** |
||
| 88 | * The random generated XSS hash to protect URL |
||
| 89 | * @var string |
||
| 90 | */ |
||
| 91 | protected string $xssHash = ''; |
||
| 92 | |||
| 93 | /** |
||
| 94 | * The list of forbidden strings |
||
| 95 | * @var array<string, string> |
||
| 96 | */ |
||
| 97 | protected array $forbiddenStrings = [ |
||
| 98 | 'document.cookie' => '[removed]', |
||
| 99 | 'document.write' => '[removed]', |
||
| 100 | '.parentNode' => '[removed]', |
||
| 101 | '.innerHTML' => '[removed]', |
||
| 102 | '-moz-binding' => '[removed]', |
||
| 103 | '<!--' => '<!--', |
||
| 104 | '-->' => '-->', |
||
| 105 | '<![CDATA[' => '<![CDATA[', |
||
| 106 | '<comment>' => '<comment>', |
||
| 107 | '<%' => '<%' |
||
| 108 | ]; |
||
| 109 | |||
| 110 | /** |
||
| 111 | * The list of forbidden strings patterns |
||
| 112 | * @var array<string> |
||
| 113 | */ |
||
| 114 | protected array $forbiddenStringPatterns = [ |
||
| 115 | 'javascript\s*:', |
||
| 116 | '(document|(document\.)?window)\.(location|on\w*)', |
||
| 117 | 'expression\s*(\(|&\#40;)', // CSS and IE |
||
| 118 | 'vbscript\s*:', // IE, surprise! |
||
| 119 | 'wscript\s*:', // IE |
||
| 120 | 'jscript\s*:', // IE |
||
| 121 | 'vbs\s*:', // IE |
||
| 122 | 'Redirect\s+30\d', |
||
| 123 | "([\"'])?data\s*:[^\\1]*?base64[^\\1]*?,[^\\1]*?\\1?" |
||
| 124 | ]; |
||
| 125 | |||
| 126 | /** |
||
| 127 | * Create new instance |
||
| 128 | * @param string $charset |
||
| 129 | */ |
||
| 130 | public function __construct(string $charset = 'UTF-8') |
||
| 133 | } |
||
| 134 | |||
| 135 | /** |
||
| 136 | * The main function to clean input |
||
| 137 | * @param mixed $str |
||
| 138 | * @param bool $isImage |
||
| 139 | * @return mixed |
||
| 140 | */ |
||
| 141 | public function clean(mixed $str, bool $isImage = false): mixed |
||
| 142 | { |
||
| 143 | if (is_array($str)) { |
||
| 144 | foreach ($str as $key => &$value) { |
||
| 145 | $str[$key] = $this->clean($value); |
||
| 146 | } |
||
| 147 | |||
| 148 | return $str; |
||
| 149 | } |
||
| 150 | |||
| 151 | if ($str === '' || $str === null || is_bool($str) || ! $str || is_numeric($str)) { |
||
| 152 | return $str; |
||
| 153 | } |
||
| 154 | |||
| 155 | // Remove Invisible Characters |
||
| 156 | $str = $this->removeInvisibleCharacters($str); |
||
| 157 | |||
| 158 | // URL Decode |
||
| 159 | // Just in case stuff like this is submitted: |
||
| 160 | // <a href="http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D">Google</a> |
||
| 161 | // Note: Use rawurldecode() so it does not remove plus signs |
||
| 162 | if (stripos($str, '%') !== false) { |
||
| 163 | do { |
||
| 164 | $oldStr = $str; |
||
| 165 | $rawStr = rawurldecode($str); |
||
| 166 | $str = (string) preg_replace_callback( |
||
| 167 | '#%(?:\s*[0-9a-f]){2,}#i', |
||
| 168 | [$this, 'urlDecodeSpaces'], |
||
| 169 | $rawStr |
||
| 170 | ); |
||
| 171 | } while ($oldStr !== $str); |
||
| 172 | unset($oldStr); |
||
| 173 | } |
||
| 174 | |||
| 175 | /* |
||
| 176 | * Convert character entities to ASCII |
||
| 177 | * |
||
| 178 | * This permits our tests below to work reliably. |
||
| 179 | * We only convert entities that are within tags since |
||
| 180 | * these are the ones that will pose security problems. |
||
| 181 | */ |
||
| 182 | $str = (string) preg_replace_callback( |
||
| 183 | "/[^a-z0-9>]+[a-z0-9]+=([\'\"]).*?\\1/si", |
||
| 184 | [$this, 'convertAttribute'], |
||
| 185 | $str |
||
| 186 | ); |
||
| 187 | |||
| 188 | $str = (string) preg_replace_callback( |
||
| 189 | '/<\w+.*/si', |
||
| 190 | [$this, 'decodeEntity'], |
||
| 191 | $str |
||
| 192 | ); |
||
| 193 | |||
| 194 | // Remove Invisible Characters Again! |
||
| 195 | $str = $this->removeInvisibleCharacters($str); |
||
| 196 | |||
| 197 | /* |
||
| 198 | * Convert all tabs to spaces |
||
| 199 | * |
||
| 200 | * This prevents strings like this: ja vascript |
||
| 201 | * NOTE: we deal with spaces between characters later. |
||
| 202 | * NOTE: preg_replace was found to be amazingly slow here on |
||
| 203 | * large blocks of data, so we use str_replace. |
||
| 204 | */ |
||
| 205 | $str = str_replace("\t", ' ', $str); |
||
| 206 | |||
| 207 | // Capture converted string for later comparison |
||
| 208 | $convertedString = $str; |
||
| 209 | |||
| 210 | // Remove Strings that are never allowed |
||
| 211 | $str = $this->removeForbiddenStrings($str); |
||
| 212 | |||
| 213 | /* |
||
| 214 | * Makes PHP tags safe |
||
| 215 | * Note: XML tags are inadvertently replaced too: |
||
| 216 | * <?xml |
||
| 217 | * |
||
| 218 | * But it doesn't seem to pose a problem. |
||
| 219 | */ |
||
| 220 | if ($isImage) { |
||
| 221 | // Images have a tendency to have the PHP short opening and |
||
| 222 | // closing tags every so often so we skip those and only |
||
| 223 | // do the long opening tags. |
||
| 224 | $str = (string) preg_replace( |
||
| 225 | '/<\?(php)/i', |
||
| 226 | '<?\\1', |
||
| 227 | $str |
||
| 228 | ); |
||
| 229 | } else { |
||
| 230 | $str = str_replace( |
||
| 231 | ['<?', '?' . '>'], |
||
| 232 | ['<?', '?>'], |
||
| 233 | $str |
||
| 234 | ); |
||
| 235 | } |
||
| 236 | |||
| 237 | /* |
||
| 238 | * Compact any exploded words |
||
| 239 | * |
||
| 240 | * This corrects words like: j a v a s c r i p t |
||
| 241 | * These words are compacted back to their correct state. |
||
| 242 | */ |
||
| 243 | $words = [ |
||
| 244 | 'javascript', 'expression', 'vbscript', 'jscript', 'wscript', |
||
| 245 | 'vbs', 'script', 'base64', 'applet', 'alert', 'document', |
||
| 246 | 'write', 'cookie', 'window', 'confirm', 'prompt', 'eval' |
||
| 247 | ]; |
||
| 248 | |||
| 249 | foreach ($words as $word) { |
||
| 250 | $word = implode('\s*', str_split($word)) . '\s*'; |
||
|
|
|||
| 251 | |||
| 252 | // We only want to do this when it is followed by a non-word character |
||
| 253 | // That way valid stuff like "dealer to" does not become "dealerto" |
||
| 254 | $str = (string) preg_replace_callback( |
||
| 255 | '#(' . substr($word, 0, -3) . ')(\W)#is', |
||
| 256 | [$this, 'compactExplodedWords'], |
||
| 257 | $str |
||
| 258 | ); |
||
| 259 | } |
||
| 260 | |||
| 261 | /* |
||
| 262 | * Remove disallowed Javascript in links or img tags |
||
| 263 | * We used to do some version comparisons and use of stripos(), |
||
| 264 | * but it is dog slow compared to these simplified non-capturing |
||
| 265 | * preg_match(), especially if the pattern exists in the string |
||
| 266 | * |
||
| 267 | * Note: It was reported that not only space characters, but all in |
||
| 268 | * the following pattern can be parsed as separators between a tag name |
||
| 269 | * and its attributes: [\d\s"\'`;,\/\=\(\x00\x0B\x09\x0C] |
||
| 270 | * ... however, remove invisible characters above already strips the |
||
| 271 | * hex-encoded ones, so we'll skip them below. |
||
| 272 | */ |
||
| 273 | do { |
||
| 274 | $original = $str; |
||
| 275 | |||
| 276 | if (preg_match('/<a/i', $str)) { |
||
| 277 | $str = (string) preg_replace_callback( |
||
| 278 | '#<a(?:rea)?[^a-z0-9>]+([^>]*?)(?:>|$)#si', |
||
| 279 | [$this, 'removeJsLink'], |
||
| 280 | $str |
||
| 281 | ); |
||
| 282 | } |
||
| 283 | |||
| 284 | if (preg_match('/<img/i', $str)) { |
||
| 285 | $str = (string) preg_replace_callback( |
||
| 286 | '#<img[^a-z0-9]+([^>]*?)(?:\s?/?>|$)#si', |
||
| 287 | [$this, 'removeJsImage'], |
||
| 288 | $str |
||
| 289 | ); |
||
| 290 | } |
||
| 291 | |||
| 292 | if (preg_match('/script|xss/i', $str)) { |
||
| 293 | $str = (string) preg_replace( |
||
| 294 | '#</*(?:script|xss).*?>#si', |
||
| 295 | '[removed]', |
||
| 296 | $str |
||
| 297 | ); |
||
| 298 | } |
||
| 299 | } while ($original !== $str); |
||
| 300 | unset($original); |
||
| 301 | |||
| 302 | /* |
||
| 303 | * Sanitize naughty HTML elements |
||
| 304 | * |
||
| 305 | * If a tag containing any of the words in the list |
||
| 306 | * below is found, the tag gets converted to entities. |
||
| 307 | * |
||
| 308 | * So this: <blink> |
||
| 309 | * Becomes: <blink> |
||
| 310 | */ |
||
| 311 | |||
| 312 | $pattern = '#' |
||
| 313 | . '<((?<slash>/*\s*)((?<tagName>[a-z0-9]+)(?=[^a-z0-9]|$)|.+)' // tag |
||
| 314 | // start and name, followed by a non-tag character |
||
| 315 | . '[^\s\042\047a-z0-9>/=]*' // a valid attribute character |
||
| 316 | // immediately after the tag would count as a separator |
||
| 317 | // optional attributes |
||
| 318 | . '(?<attributes>(?:[\s\042\047/=]*' // non-attribute characters, |
||
| 319 | // excluding > (tag close) for obvious reasons |
||
| 320 | . '[^\s\042\047>/=]+' // attribute characters |
||
| 321 | // optional attribute-value |
||
| 322 | . '(?:\s*=' // attribute-value separator |
||
| 323 | . '(?:[^\s\042\047=><`]+|\s*\042[^\042]*\042|\s*\047[^\047]' |
||
| 324 | . '*\047|\s*(?U:[^\s\042\047=><`]*))' // single, double or non-quoted value |
||
| 325 | . ')?' // end optional attribute-value group |
||
| 326 | . ')*)' // end optional attributes group |
||
| 327 | . '[^>]*)(?<closeTag>\>)?#isS'; |
||
| 328 | |||
| 329 | // Note: It would be nice to optimize this for speed, BUT |
||
| 330 | // only matching the naughty elements here results in |
||
| 331 | // false positives and in turn - vulnerabilities! |
||
| 332 | do { |
||
| 333 | $oldStr = $str; |
||
| 334 | $str = (string) preg_replace_callback( |
||
| 335 | $pattern, |
||
| 336 | [$this, 'sanitizeNaughtyHtml'], |
||
| 337 | $str |
||
| 338 | ); |
||
| 339 | } while ($oldStr !== $str); |
||
| 340 | unset($oldStr); |
||
| 341 | |||
| 342 | /* |
||
| 343 | * Sanitize naughty scripting elements |
||
| 344 | * |
||
| 345 | * Similar to above, only instead of looking for |
||
| 346 | * tags it looks for PHP and JavaScript commands |
||
| 347 | * that are disallowed. Rather than removing the |
||
| 348 | * code, it simply converts the parenthesis to entities |
||
| 349 | * rendering the code un-executable. |
||
| 350 | * |
||
| 351 | * For example: eval('some code') |
||
| 352 | * Becomes: eval('some code') |
||
| 353 | */ |
||
| 354 | $str = (string) preg_replace( |
||
| 355 | '#(alert|prompt|confirm|cmd|passthru|eval|exec|expression|system|' |
||
| 356 | . 'fopen|fsockopen|file|file_get_contents|readfile|unlink)(\s*)\((.*?)\)#si', |
||
| 357 | '\\1\\2(\\3)', |
||
| 358 | $str |
||
| 359 | ); |
||
| 360 | |||
| 361 | // Final clean up |
||
| 362 | // This adds a bit of extra precaution in case |
||
| 363 | // something got through the above filters |
||
| 364 | $str = $this->removeForbiddenStrings($str); |
||
| 365 | |||
| 366 | /* |
||
| 367 | * Images are Handled in a Special Way |
||
| 368 | * - Essentially, we want to know that after all of the character |
||
| 369 | * conversion is done whether any unwanted, likely XSS, code was found. |
||
| 370 | * If not, we return TRUE, as the image is clean. |
||
| 371 | * However, if the string post-conversion does not matched the |
||
| 372 | * string post-removal of XSS, then it fails, as there was unwanted XSS |
||
| 373 | * code found and removed/changed during processing. |
||
| 374 | */ |
||
| 375 | if ($isImage) { |
||
| 376 | return ($str === $convertedString); |
||
| 377 | } |
||
| 378 | |||
| 379 | return $str; |
||
| 380 | } |
||
| 381 | |||
| 382 | /** |
||
| 383 | * Generate the XSS hash if not yet generated |
||
| 384 | * and return it |
||
| 385 | * @return string |
||
| 386 | */ |
||
| 387 | public function getXssHash(): string |
||
| 388 | { |
||
| 389 | if (empty($this->xssHash)) { |
||
| 390 | $this->xssHash = Str::random(16); |
||
| 391 | } |
||
| 392 | |||
| 393 | return $this->xssHash; |
||
| 394 | } |
||
| 395 | |||
| 396 | |||
| 397 | /** |
||
| 398 | * Return the character set |
||
| 399 | * @return string |
||
| 400 | */ |
||
| 401 | public function getCharset(): string |
||
| 402 | { |
||
| 403 | return $this->charset; |
||
| 404 | } |
||
| 405 | |||
| 406 | /** |
||
| 407 | * Set the character set |
||
| 408 | * @param string $charset |
||
| 409 | * @return $this |
||
| 410 | */ |
||
| 411 | public function setCharset(string $charset): self |
||
| 412 | { |
||
| 413 | $this->charset = $charset; |
||
| 414 | return $this; |
||
| 415 | } |
||
| 416 | |||
| 417 | /** |
||
| 418 | * Sanitize the filename |
||
| 419 | * @param string $str |
||
| 420 | * @param bool $isRelativePath whether to preserve path |
||
| 421 | * @return string |
||
| 422 | */ |
||
| 423 | public function sanitizeFilename(string $str, bool $isRelativePath = false): string |
||
| 424 | { |
||
| 425 | $invalids = $this->invalidFilenameChars; |
||
| 426 | if ($isRelativePath === false) { |
||
| 427 | $invalids[] = './'; |
||
| 428 | $invalids[] = '/'; |
||
| 429 | } |
||
| 430 | |||
| 431 | $cleanStr = $this->removeInvisibleCharacters($str, false); |
||
| 432 | do { |
||
| 433 | $old = $cleanStr; |
||
| 434 | $cleanStr = str_replace($invalids, '', $cleanStr); |
||
| 435 | } while ($old !== $cleanStr); |
||
| 436 | |||
| 437 | return stripslashes($cleanStr); |
||
| 438 | } |
||
| 439 | |||
| 440 | /** |
||
| 441 | * Remove the "img" tags |
||
| 442 | * @param string $str |
||
| 443 | * @return string |
||
| 444 | */ |
||
| 445 | public function stripImageTags(string $str): string |
||
| 446 | { |
||
| 447 | return (string) preg_replace( |
||
| 448 | [ |
||
| 449 | '#<img[\s/]+.*?src\s*=\s*(["\'])([^\\1]+?)\\1.*?\>#i', |
||
| 450 | '#<img[\s/]+.*?src\s*=\s*?(([^\s"\'=<>`]+)).*?\>#i', |
||
| 451 | ], |
||
| 452 | '\\2', |
||
| 453 | $str |
||
| 454 | ); |
||
| 455 | } |
||
| 456 | |||
| 457 | /** |
||
| 458 | * HTML Entities Decode |
||
| 459 | * A replacement for html_entity_decode() |
||
| 460 | * |
||
| 461 | * The reason we are not using html_entity_decode() by itself is because |
||
| 462 | * while it is not technically correct to leave out the semicolon |
||
| 463 | * at the end of an entity most browsers will still interpret the entity |
||
| 464 | * correctly. html_entity_decode() does not convert entities without |
||
| 465 | * semicolons, so we are left with our own little solution here. Bummer. |
||
| 466 | * |
||
| 467 | * @param string $str |
||
| 468 | * @param string|null $charset the custom character set if not will use the current one |
||
| 469 | * @return string |
||
| 470 | */ |
||
| 471 | protected function htmlEntityDecode(string $str, ?string $charset = null): string |
||
| 472 | { |
||
| 473 | if (strpos($str, '&') === false) { |
||
| 474 | return $str; |
||
| 475 | } |
||
| 476 | |||
| 477 | static $entities; |
||
| 478 | |||
| 479 | if ($charset === null) { |
||
| 480 | $charset = $this->charset; |
||
| 481 | } |
||
| 482 | |||
| 483 | $flag = ENT_COMPAT | ENT_HTML5; |
||
| 484 | |||
| 485 | if (! isset($entities)) { |
||
| 486 | $entities = array_map( |
||
| 487 | 'strtolower', |
||
| 488 | get_html_translation_table(HTML_ENTITIES, $flag, $charset) |
||
| 489 | ); |
||
| 490 | } |
||
| 491 | |||
| 492 | do { |
||
| 493 | $strCompare = $str; |
||
| 494 | |||
| 495 | // Decode standard entities, avoiding false positives |
||
| 496 | $matches = []; |
||
| 497 | if (preg_match_all('/&[a-z]{2,}(?![a-z;])/i', $str, $matches) > 0) { |
||
| 498 | $replace = []; |
||
| 499 | $matches = array_unique(array_map('strtolower', $matches[0])); |
||
| 500 | foreach ($matches as &$match) { |
||
| 501 | if (($char = array_search($match . ';', $entities, true)) !== false) { |
||
| 502 | $replace[$match] = $char; |
||
| 503 | } |
||
| 504 | } |
||
| 505 | |||
| 506 | $strReplace = str_replace(array_keys($replace), array_values($replace), $str); |
||
| 507 | |||
| 508 | // Decode numeric & UTF16 two byte entities |
||
| 509 | $str = html_entity_decode( |
||
| 510 | (string) preg_replace( |
||
| 511 | '/(&#(?:x0*[0-9a-f]{2,5}(?![0-9a-f;])|(?:0*\d{2,4}(?![0-9;]))))/iS', |
||
| 512 | '$1;', |
||
| 513 | $strReplace |
||
| 514 | ), |
||
| 515 | $flag, |
||
| 516 | $charset |
||
| 517 | ); |
||
| 518 | } |
||
| 519 | } while ($strCompare !== $str); |
||
| 520 | |||
| 521 | return $str; |
||
| 522 | } |
||
| 523 | |||
| 524 | |||
| 525 | |||
| 526 | /** |
||
| 527 | * The URL decode taking space into account |
||
| 528 | * @param array<int, string> $matches |
||
| 529 | * @return string |
||
| 530 | */ |
||
| 531 | protected function urlDecodeSpaces(array $matches): string |
||
| 532 | { |
||
| 533 | $input = $matches[0]; |
||
| 534 | $noSpace = (string) preg_replace('#\s+#', '', $input); |
||
| 535 | |||
| 536 | return $noSpace === $input |
||
| 537 | ? $input |
||
| 538 | : rawurldecode($noSpace); |
||
| 539 | } |
||
| 540 | |||
| 541 | /** |
||
| 542 | * Compact exploded words (remove white space from string like 'j a v a s c r i p t') |
||
| 543 | * @param array<int, string> $matches |
||
| 544 | * @return string |
||
| 545 | */ |
||
| 546 | protected function compactExplodedWords(array $matches): string |
||
| 547 | { |
||
| 548 | return (string) preg_replace('/\s+/s', '', $matches[1]) . $matches[2]; |
||
| 549 | } |
||
| 550 | |||
| 551 | /** |
||
| 552 | * Sanitize the string to remove naughty HTML elements |
||
| 553 | * @param array<int|string, string> $matches |
||
| 554 | * @return string |
||
| 555 | */ |
||
| 556 | protected function sanitizeNaughtyHtml(array $matches): string |
||
| 641 | } |
||
| 642 | |||
| 643 | /** |
||
| 644 | * Remove the JS link from the string |
||
| 645 | * @param array<int, string> $matches |
||
| 646 | * @return string |
||
| 647 | */ |
||
| 648 | protected function removeJsLink(array $matches): string |
||
| 649 | { |
||
| 650 | return str_replace( |
||
| 651 | $matches[1], |
||
| 652 | (string) preg_replace( |
||
| 653 | '#href=.*?(?:(?:alert|prompt|confirm)(?:\(|&\#40;)|javascript:' |
||
| 654 | . '|livescript:|mocha:|charset=|window\.|document\.|\.cookie' |
||
| 655 | . '|<script|<xss|d\s*a\s*t\s*a\s*:)#si', |
||
| 656 | '', |
||
| 657 | $this->filterAttributes($matches[1]) |
||
| 658 | ), |
||
| 659 | $matches[0] |
||
| 660 | ); |
||
| 661 | } |
||
| 662 | |||
| 663 | /** |
||
| 664 | * Remove the JS from image tags |
||
| 665 | * @param array<int, string> $matches |
||
| 666 | * @return string |
||
| 667 | */ |
||
| 668 | protected function removeJsImage(array $matches): string |
||
| 669 | { |
||
| 670 | return str_replace( |
||
| 671 | $matches[1], |
||
| 672 | (string) preg_replace( |
||
| 673 | '#src=.*?(?:(?:alert|prompt|confirm|eval)(?:\(|&\#40;)|javascript:' |
||
| 674 | . '|livescript:|mocha:|charset=|window\.|document\.|\.cooki' |
||
| 675 | . 'e|<script|<xss|base64\s*,)#si', |
||
| 676 | '', |
||
| 677 | $this->filterAttributes($matches[1]) |
||
| 678 | ), |
||
| 679 | $matches[0] |
||
| 680 | ); |
||
| 681 | } |
||
| 682 | |||
| 683 | /** |
||
| 684 | * The HTML entities decode callback |
||
| 685 | * @param array<int, string> $matches |
||
| 686 | * @return string |
||
| 687 | */ |
||
| 688 | protected function decodeEntity(array $matches): string |
||
| 689 | { |
||
| 690 | // Protect GET variables in URLs like 901119URL5918AMP18930PROTECT8198 |
||
| 691 | $str = (string) preg_replace( |
||
| 692 | '|\&([a-z\_0-9\-]+)\=([a-z\_0-9\-/]+)|i', |
||
| 693 | $this->getXssHash() . '\\1=\\2', |
||
| 694 | $matches[0] |
||
| 695 | ); |
||
| 696 | // Decode, then un-protect URL GET vars |
||
| 697 | return str_replace( |
||
| 698 | $this->getXssHash(), |
||
| 699 | '&', |
||
| 700 | $this->htmlEntityDecode($str) |
||
| 701 | ); |
||
| 702 | } |
||
| 703 | |||
| 704 | /** |
||
| 705 | * Convert the attribute |
||
| 706 | * @param array<int, mixed> $matches |
||
| 707 | * @return string |
||
| 708 | */ |
||
| 709 | protected function convertAttribute(array $matches): string |
||
| 710 | { |
||
| 711 | return str_replace( |
||
| 712 | ['>', '<', '\\'], |
||
| 713 | ['>', '<', '\\\\'], |
||
| 714 | $matches[0] |
||
| 715 | ); |
||
| 716 | } |
||
| 717 | |||
| 718 | /** |
||
| 719 | * Filter tag attributes for consistency and safety. |
||
| 720 | * @param string $str |
||
| 721 | * @return string |
||
| 722 | */ |
||
| 723 | protected function filterAttributes(string $str): string |
||
| 724 | { |
||
| 725 | $result = ''; |
||
| 726 | $matches = []; |
||
| 727 | if ( |
||
| 728 | preg_match_all( |
||
| 729 | '#\s*[a-z\-]+\s*=\s*(\042|\047)([^\\1]*?)\\1#is', |
||
| 730 | $str, |
||
| 731 | $matches |
||
| 732 | ) > 0 |
||
| 733 | ) { |
||
| 734 | foreach ($matches[0] as $match) { |
||
| 735 | $result .= (string) preg_replace('#/\*.*?\*/#s', '', $match); |
||
| 736 | } |
||
| 737 | } |
||
| 738 | |||
| 739 | return $result; |
||
| 740 | } |
||
| 741 | |||
| 742 | /** |
||
| 743 | * Remove the forbidden strings |
||
| 744 | * @param string $str |
||
| 745 | * @return string |
||
| 746 | */ |
||
| 747 | protected function removeForbiddenStrings(string $str): string |
||
| 748 | { |
||
| 749 | $keys = array_keys($this->forbiddenStrings); |
||
| 750 | $values = array_values($this->forbiddenStrings); |
||
| 751 | |||
| 752 | $cleanStr = str_replace($keys, $values, $str); |
||
| 753 | foreach ($this->forbiddenStringPatterns as $regex) { |
||
| 754 | $cleanStr = (string) preg_replace('#' . $regex . '#is', '[removed]', $cleanStr); |
||
| 755 | } |
||
| 756 | |||
| 757 | return $cleanStr; |
||
| 758 | } |
||
| 759 | |||
| 760 | /** |
||
| 761 | * Remove invisible characters |
||
| 762 | * This prevents sandwiching null characters |
||
| 763 | * between ASCII characters, like Java\0script. |
||
| 764 | * |
||
| 765 | * @param string $str |
||
| 766 | * @param bool $urlEncode |
||
| 767 | * @return string |
||
| 768 | */ |
||
| 769 | protected function removeInvisibleCharacters(string $str, bool $urlEncode = true): string |
||
| 790 | } |
||
| 791 | } |
||
| 792 |