|
1
|
|
|
<?php |
|
2
|
|
|
|
|
3
|
|
|
/** |
|
4
|
|
|
* @package s9e\TextFormatter |
|
5
|
|
|
* @copyright Copyright (c) The s9e authors |
|
6
|
|
|
* @license http://www.opensource.org/licenses/mit-license.php The MIT License |
|
7
|
|
|
*/ |
|
8
|
|
|
namespace s9e\TextFormatter\Configurator\TemplateChecks; |
|
9
|
|
|
|
|
10
|
|
|
use DOMAttr; |
|
11
|
|
|
use DOMElement; |
|
12
|
|
|
use DOMNode; |
|
13
|
|
|
use DOMXPath; |
|
14
|
|
|
use s9e\TextFormatter\Configurator\Exceptions\UnsafeTemplateException; |
|
15
|
|
|
use s9e\TextFormatter\Configurator\Helpers\AVTHelper; |
|
16
|
|
|
use s9e\TextFormatter\Configurator\Items\Attribute; |
|
17
|
|
|
use s9e\TextFormatter\Configurator\Items\Tag; |
|
18
|
|
|
use s9e\TextFormatter\Configurator\TemplateCheck; |
|
19
|
|
|
|
|
20
|
|
|
abstract class AbstractDynamicContentCheck extends TemplateCheck |
|
21
|
|
|
{ |
|
22
|
|
|
/** |
|
23
|
|
|
* @var bool Whether to ignore unknown attributes |
|
24
|
|
|
*/ |
|
25
|
|
|
protected $ignoreUnknownAttributes = false; |
|
26
|
|
|
|
|
27
|
|
|
/** |
|
28
|
|
|
* Get the nodes targeted by this check |
|
29
|
|
|
* |
|
30
|
|
|
* @param DOMElement $template <xsl:template/> node |
|
31
|
|
|
* @return array Array of DOMElement instances |
|
32
|
|
|
*/ |
|
33
|
|
|
abstract protected function getNodes(DOMElement $template); |
|
34
|
|
|
|
|
35
|
|
|
/** |
|
36
|
|
|
* Return whether an attribute is considered safe |
|
37
|
|
|
* |
|
38
|
|
|
* @param Attribute $attribute Attribute |
|
39
|
|
|
* @return bool |
|
40
|
|
|
*/ |
|
41
|
|
|
abstract protected function isSafe(Attribute $attribute); |
|
42
|
|
|
|
|
43
|
|
|
/** |
|
44
|
|
|
* Look for improperly-filtered dynamic content |
|
45
|
|
|
* |
|
46
|
|
|
* @param DOMElement $template <xsl:template/> node |
|
47
|
|
|
* @param Tag $tag Tag this template belongs to |
|
48
|
|
|
* @return void |
|
49
|
|
|
*/ |
|
50
|
46 |
|
public function check(DOMElement $template, Tag $tag) |
|
51
|
|
|
{ |
|
52
|
46 |
|
foreach ($this->getNodes($template) as $node) |
|
53
|
|
|
{ |
|
54
|
|
|
// Test this node's safety |
|
55
|
46 |
|
$this->checkNode($node, $tag); |
|
56
|
|
|
} |
|
57
|
|
|
} |
|
58
|
|
|
|
|
59
|
|
|
/** |
|
60
|
|
|
* Configure this template check to detect unknown attributes |
|
61
|
|
|
* |
|
62
|
|
|
* @return void |
|
63
|
|
|
*/ |
|
64
|
1 |
|
public function detectUnknownAttributes() |
|
65
|
|
|
{ |
|
66
|
1 |
|
$this->ignoreUnknownAttributes = false; |
|
67
|
|
|
} |
|
68
|
|
|
|
|
69
|
|
|
/** |
|
70
|
|
|
* Configure this template check to ignore unknown attributes |
|
71
|
|
|
* |
|
72
|
|
|
* @return void |
|
73
|
|
|
*/ |
|
74
|
1 |
|
public function ignoreUnknownAttributes() |
|
75
|
|
|
{ |
|
76
|
1 |
|
$this->ignoreUnknownAttributes = true; |
|
77
|
|
|
} |
|
78
|
|
|
|
|
79
|
|
|
/** |
|
80
|
|
|
* Test whether a tag attribute is safe |
|
81
|
|
|
* |
|
82
|
|
|
* @param DOMNode $node Context node |
|
83
|
|
|
* @param Tag $tag Source tag |
|
84
|
|
|
* @param string $attrName Name of the attribute |
|
85
|
|
|
* @return void |
|
86
|
|
|
*/ |
|
87
|
34 |
|
protected function checkAttribute(DOMNode $node, Tag $tag, $attrName) |
|
88
|
|
|
{ |
|
89
|
|
|
// Test whether the attribute exists |
|
90
|
34 |
|
if (!isset($tag->attributes[$attrName])) |
|
91
|
|
|
{ |
|
92
|
15 |
|
if ($this->ignoreUnknownAttributes) |
|
93
|
|
|
{ |
|
94
|
|
|
return; |
|
95
|
|
|
} |
|
96
|
|
|
|
|
97
|
15 |
|
throw new UnsafeTemplateException("Cannot assess the safety of unknown attribute '" . $attrName . "'", $node); |
|
98
|
|
|
} |
|
99
|
|
|
|
|
100
|
|
|
// Test whether the attribute is safe to be used in this content type |
|
101
|
19 |
|
if (!$this->tagFiltersAttributes($tag) || !$this->isSafe($tag->attributes[$attrName])) |
|
102
|
|
|
{ |
|
103
|
19 |
|
throw new UnsafeTemplateException("Attribute '" . $attrName . "' is not properly sanitized to be used in this context", $node); |
|
104
|
|
|
} |
|
105
|
|
|
} |
|
106
|
|
|
|
|
107
|
|
|
/** |
|
108
|
|
|
* Test whether an attribute expression is safe |
|
109
|
|
|
* |
|
110
|
|
|
* @param DOMNode $node Context node |
|
111
|
|
|
* @param Tag $tag Source tag |
|
112
|
|
|
* @param string $expr XPath expression that evaluates to one or multiple named attributes |
|
113
|
|
|
* @return void |
|
114
|
|
|
*/ |
|
115
|
34 |
|
protected function checkAttributeExpression(DOMNode $node, Tag $tag, $expr) |
|
116
|
|
|
{ |
|
117
|
34 |
|
preg_match_all('(@([-\\w]+))', $expr, $matches); |
|
118
|
34 |
|
foreach ($matches[1] as $attrName) |
|
119
|
|
|
{ |
|
120
|
34 |
|
$this->checkAttribute($node, $tag, $attrName); |
|
121
|
|
|
} |
|
122
|
|
|
} |
|
123
|
|
|
|
|
124
|
|
|
/** |
|
125
|
|
|
* Test whether an attribute node is safe |
|
126
|
|
|
* |
|
127
|
|
|
* @param DOMAttr $attribute Attribute node |
|
128
|
|
|
* @param Tag $tag Reference tag |
|
129
|
|
|
* @return void |
|
130
|
|
|
*/ |
|
131
|
14 |
|
protected function checkAttributeNode(DOMAttr $attribute, Tag $tag) |
|
132
|
|
|
{ |
|
133
|
|
|
// Parse the attribute value for XPath expressions and assess their safety |
|
134
|
14 |
|
foreach (AVTHelper::parse($attribute->value) as $token) |
|
135
|
|
|
{ |
|
136
|
14 |
|
if ($token[0] === 'expression') |
|
137
|
|
|
{ |
|
138
|
14 |
|
$this->checkExpression($attribute, $token[1], $tag); |
|
139
|
|
|
} |
|
140
|
|
|
} |
|
141
|
|
|
} |
|
142
|
|
|
|
|
143
|
|
|
/** |
|
144
|
|
|
* Test whether a node's context can be safely assessed |
|
145
|
|
|
* |
|
146
|
|
|
* @param DOMNode $node Source node |
|
147
|
|
|
* @return void |
|
148
|
|
|
*/ |
|
149
|
43 |
|
protected function checkContext(DOMNode $node) |
|
150
|
|
|
{ |
|
151
|
|
|
// Test whether we know in what context this node is used. An <xsl:for-each/> ancestor would // change this node's context |
|
152
|
43 |
|
$xpath = new DOMXPath($node->ownerDocument); |
|
153
|
43 |
|
$ancestors = $xpath->query('ancestor::xsl:for-each', $node); |
|
154
|
|
|
|
|
155
|
43 |
|
if ($ancestors->length) |
|
156
|
|
|
{ |
|
157
|
3 |
|
throw new UnsafeTemplateException("Cannot assess context due to '" . $ancestors->item(0)->nodeName . "'", $node); |
|
158
|
|
|
} |
|
159
|
|
|
} |
|
160
|
|
|
|
|
161
|
|
|
/** |
|
162
|
|
|
* Test whether an <xsl:copy-of/> node is safe |
|
163
|
|
|
* |
|
164
|
|
|
* @param DOMElement $node <xsl:copy-of/> node |
|
165
|
|
|
* @param Tag $tag Reference tag |
|
166
|
|
|
* @return void |
|
167
|
|
|
*/ |
|
168
|
7 |
|
protected function checkCopyOfNode(DOMElement $node, Tag $tag) |
|
169
|
|
|
{ |
|
170
|
7 |
|
$this->checkSelectNode($node->getAttributeNode('select'), $tag); |
|
171
|
|
|
} |
|
172
|
|
|
|
|
173
|
|
|
/** |
|
174
|
|
|
* Test whether an element node is safe |
|
175
|
|
|
* |
|
176
|
|
|
* @param DOMElement $element Element |
|
177
|
|
|
* @param Tag $tag Reference tag |
|
178
|
|
|
* @return void |
|
179
|
|
|
*/ |
|
180
|
26 |
|
protected function checkElementNode(DOMElement $element, Tag $tag) |
|
181
|
|
|
{ |
|
182
|
26 |
|
$xpath = new DOMXPath($element->ownerDocument); |
|
|
|
|
|
|
183
|
|
|
|
|
184
|
|
|
// If current node is not an <xsl:attribute/> element, we exclude descendants |
|
185
|
|
|
// with an <xsl:attribute/> ancestor so that content such as: |
|
186
|
|
|
// <script><xsl:attribute name="id"><xsl:value-of/></xsl:attribute></script> |
|
187
|
|
|
// would not trigger a false-positive due to the presence of an <xsl:value-of/> |
|
188
|
|
|
// element in a <script> |
|
189
|
26 |
|
$predicate = ($element->localName === 'attribute') ? '' : '[not(ancestor::xsl:attribute)]'; |
|
190
|
|
|
|
|
191
|
|
|
// Test the select expression of <xsl:value-of/> nodes |
|
192
|
26 |
|
$query = './/xsl:value-of' . $predicate; |
|
193
|
26 |
|
foreach ($xpath->query($query, $element) as $valueOf) |
|
194
|
|
|
{ |
|
195
|
22 |
|
$this->checkSelectNode($valueOf->getAttributeNode('select'), $tag); |
|
196
|
|
|
} |
|
197
|
|
|
|
|
198
|
|
|
// Reject all <xsl:apply-templates/> nodes |
|
199
|
4 |
|
$query = './/xsl:apply-templates' . $predicate; |
|
200
|
4 |
|
foreach ($xpath->query($query, $element) as $applyTemplates) |
|
201
|
|
|
{ |
|
202
|
3 |
|
throw new UnsafeTemplateException('Cannot allow unfiltered data in this context', $applyTemplates); |
|
203
|
|
|
} |
|
204
|
|
|
} |
|
205
|
|
|
|
|
206
|
|
|
/** |
|
207
|
|
|
* Test the safety of an XPath expression |
|
208
|
|
|
* |
|
209
|
|
|
* @param DOMNode $node Source node |
|
210
|
|
|
* @param string $expr XPath expression |
|
211
|
|
|
* @param Tag $tag Source tag |
|
212
|
|
|
* @return void |
|
213
|
|
|
*/ |
|
214
|
43 |
|
protected function checkExpression(DOMNode $node, $expr, Tag $tag) |
|
215
|
|
|
{ |
|
216
|
43 |
|
$this->checkContext($node); |
|
217
|
|
|
|
|
218
|
40 |
|
if (preg_match('/^\\$(\\w+)$/', $expr, $m)) |
|
219
|
|
|
{ |
|
220
|
|
|
// Either this expression came from a variable that is considered safe, or it's a |
|
221
|
|
|
// stylesheet parameters, which are considered safe by default |
|
222
|
5 |
|
$this->checkVariable($node, $tag, $m[1]); |
|
223
|
|
|
} |
|
224
|
40 |
|
elseif (preg_match('/^@[-\\w]+(?:\\s*\\|\\s*@[-\\w]+)*$/', $expr)) |
|
225
|
|
|
{ |
|
226
|
34 |
|
$this->checkAttributeExpression($node, $tag, $expr); |
|
227
|
|
|
} |
|
228
|
6 |
|
elseif (!$this->isExpressionSafe($expr)) |
|
229
|
|
|
{ |
|
230
|
6 |
|
throw new UnsafeTemplateException("Cannot assess the safety of expression '" . $expr . "'", $node); |
|
231
|
|
|
} |
|
232
|
|
|
} |
|
233
|
|
|
|
|
234
|
|
|
/** |
|
235
|
|
|
* Test whether a node is safe |
|
236
|
|
|
* |
|
237
|
|
|
* @param DOMNode $node Source node |
|
238
|
|
|
* @param Tag $tag Reference tag |
|
239
|
|
|
* @return void |
|
240
|
|
|
*/ |
|
241
|
46 |
|
protected function checkNode(DOMNode $node, Tag $tag) |
|
242
|
|
|
{ |
|
243
|
46 |
|
if ($node instanceof DOMAttr) |
|
244
|
|
|
{ |
|
245
|
14 |
|
$this->checkAttributeNode($node, $tag); |
|
246
|
|
|
} |
|
247
|
32 |
|
elseif ($node instanceof DOMElement) |
|
248
|
|
|
{ |
|
249
|
32 |
|
if ($node->namespaceURI === self::XMLNS_XSL && $node->localName === 'copy-of') |
|
250
|
|
|
{ |
|
251
|
7 |
|
$this->checkCopyOfNode($node, $tag); |
|
252
|
|
|
} |
|
253
|
|
|
else |
|
254
|
|
|
{ |
|
255
|
26 |
|
$this->checkElementNode($node, $tag); |
|
256
|
|
|
} |
|
257
|
|
|
} |
|
258
|
|
|
} |
|
259
|
|
|
|
|
260
|
|
|
/** |
|
261
|
|
|
* Check whether a variable is safe in context |
|
262
|
|
|
* |
|
263
|
|
|
* @param DOMNode $node Context node |
|
264
|
|
|
* @param Tag $tag Source tag |
|
265
|
|
|
* @param string $qname Name of the variable |
|
266
|
|
|
* @return void |
|
267
|
|
|
*/ |
|
268
|
5 |
|
protected function checkVariable(DOMNode $node, $tag, $qname) |
|
269
|
|
|
{ |
|
270
|
|
|
// Test whether this variable comes from a previous xsl:param or xsl:variable element |
|
271
|
5 |
|
$this->checkVariableDeclaration($node, $tag, 'xsl:param[@name="' . $qname . '"]'); |
|
272
|
4 |
|
$this->checkVariableDeclaration($node, $tag, 'xsl:variable[@name="' . $qname . '"]'); |
|
273
|
|
|
} |
|
274
|
|
|
|
|
275
|
|
|
/** |
|
276
|
|
|
* Check whether a variable declaration is safe in context |
|
277
|
|
|
* |
|
278
|
|
|
* @param DOMNode $node Context node |
|
279
|
|
|
* @param Tag $tag Source tag |
|
280
|
|
|
* @param string $query XPath query |
|
281
|
|
|
* @return void |
|
282
|
|
|
*/ |
|
283
|
5 |
|
protected function checkVariableDeclaration(DOMNode $node, $tag, $query) |
|
284
|
|
|
{ |
|
285
|
5 |
|
$query = 'ancestor-or-self::*/preceding-sibling::' . $query . '[@select]'; |
|
286
|
5 |
|
$xpath = new DOMXPath($node->ownerDocument); |
|
287
|
5 |
|
foreach ($xpath->query($query, $node) as $varNode) |
|
288
|
|
|
{ |
|
289
|
|
|
// Intercept the UnsafeTemplateException and change the node to the one we're |
|
290
|
|
|
// really checking before rethrowing it |
|
291
|
|
|
try |
|
292
|
|
|
{ |
|
293
|
5 |
|
$this->checkExpression($varNode, $varNode->getAttribute('select'), $tag); |
|
294
|
|
|
} |
|
295
|
5 |
|
catch (UnsafeTemplateException $e) |
|
296
|
|
|
{ |
|
297
|
5 |
|
$e->setNode($node); |
|
298
|
|
|
|
|
299
|
5 |
|
throw $e; |
|
300
|
|
|
} |
|
301
|
|
|
} |
|
302
|
|
|
} |
|
303
|
|
|
|
|
304
|
|
|
/** |
|
305
|
|
|
* Test whether a select attribute of a node is safe |
|
306
|
|
|
* |
|
307
|
|
|
* @param DOMAttr $select Select attribute node |
|
308
|
|
|
* @param Tag $tag Reference tag |
|
309
|
|
|
* @return void |
|
310
|
|
|
*/ |
|
311
|
29 |
|
protected function checkSelectNode(DOMAttr $select, Tag $tag) |
|
312
|
|
|
{ |
|
313
|
29 |
|
$this->checkExpression($select, $select->value, $tag); |
|
314
|
|
|
} |
|
315
|
|
|
|
|
316
|
|
|
/** |
|
317
|
|
|
* Test whether given expression is safe in context |
|
318
|
|
|
* |
|
319
|
|
|
* @param string $expr XPath expression |
|
320
|
|
|
* @return bool Whether the expression is safe in context |
|
321
|
|
|
*/ |
|
322
|
2 |
|
protected function isExpressionSafe($expr) |
|
323
|
|
|
{ |
|
324
|
2 |
|
return false; |
|
325
|
|
|
} |
|
326
|
|
|
|
|
327
|
|
|
/** |
|
328
|
|
|
* Test whether given tag filters attribute values |
|
329
|
|
|
* |
|
330
|
|
|
* @param Tag $tag |
|
331
|
|
|
* @return bool |
|
332
|
|
|
*/ |
|
333
|
19 |
|
protected function tagFiltersAttributes(Tag $tag) |
|
334
|
|
|
{ |
|
335
|
19 |
|
return $tag->filterChain->containsCallback('s9e\\TextFormatter\\Parser\\FilterProcessing::filterAttributes'); |
|
336
|
|
|
} |
|
337
|
|
|
} |