BigW Consortium Gitlab
Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
G
gitlab-ce
Project
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Commits
Issue Boards
Open sidebar
Forest Godfrey
gitlab-ce
Commits
16f8ca56
Commit
16f8ca56
authored
Oct 01, 2015
by
Robert Speicher
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Add custom protocol whitelisting to SanitizationFilter
Addresses internal
https://dev.gitlab.org/gitlab/gitlabhq/issues/2613
parent
d7eceafb
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
110 additions
and
10 deletions
+110
-10
sanitization_filter.rb
lib/gitlab/markdown/sanitization_filter.rb
+19
-0
sanitization_filter_spec.rb
spec/lib/gitlab/markdown/sanitization_filter_spec.rb
+91
-10
No files found.
lib/gitlab/markdown/sanitization_filter.rb
View file @
16f8ca56
...
...
@@ -48,6 +48,12 @@ module Gitlab
# Allow span elements
whitelist
[
:elements
].
push
(
'span'
)
# Allow any protocol in `a` elements...
whitelist
[
:protocols
].
delete
(
'a'
)
# ...but then remove links with the `javascript` protocol
whitelist
[
:transformers
].
push
(
remove_javascript_links
)
# Remove `rel` attribute from `a` elements
whitelist
[
:transformers
].
push
(
remove_rel
)
...
...
@@ -57,6 +63,19 @@ module Gitlab
whitelist
end
def
remove_javascript_links
lambda
do
|
env
|
node
=
env
[
:node
]
return
unless
node
.
name
==
'a'
return
unless
node
.
has_attribute?
(
'href'
)
if
node
[
'href'
].
start_with?
(
'javascript'
,
':javascript'
)
node
.
remove_attribute
(
'href'
)
end
end
end
def
remove_rel
lambda
do
|
env
|
if
env
[
:node_name
]
==
'a'
...
...
spec/lib/gitlab/markdown/sanitization_filter_spec.rb
View file @
16f8ca56
...
...
@@ -44,7 +44,7 @@ module Gitlab::Markdown
instance
=
described_class
.
new
(
'Foo'
)
3
.
times
{
instance
.
whitelist
}
expect
(
instance
.
whitelist
[
:transformers
].
size
).
to
eq
4
expect
(
instance
.
whitelist
[
:transformers
].
size
).
to
eq
5
end
it
'allows syntax highlighting'
do
...
...
@@ -77,19 +77,100 @@ module Gitlab::Markdown
end
it
'removes `rel` attribute from `a` elements'
do
doc
=
filter
(
%q{<a href="#" rel="nofollow">Link</a>}
)
act
=
%q{<a href="#" rel="nofollow">Link</a>}
exp
=
%q{<a href="#">Link</a>}
expect
(
doc
.
css
(
'a'
).
size
).
to
eq
1
expect
(
doc
.
at_css
(
'a'
)[
'href'
]).
to
eq
'#'
expect
(
doc
.
at_css
(
'a'
)[
'rel'
]).
to
be_nil
expect
(
filter
(
act
).
to_html
).
to
eq
exp
end
it
'removes script-like `href` attribute from `a` elements'
do
html
=
%q{<a href="javascript:alert('Hi')">Hi</a>}
doc
=
filter
(
html
)
# Adapted from the Sanitize test suite: http://git.io/vczrM
protocols
=
{
'protocol-based JS injection: simple, no spaces'
=>
{
input:
'<a href="javascript:alert(\'XSS\');">foo</a>'
,
output:
'<a>foo</a>'
},
'protocol-based JS injection: simple, spaces before'
=>
{
input:
'<a href="javascript :alert(\'XSS\');">foo</a>'
,
output:
'<a>foo</a>'
},
'protocol-based JS injection: simple, spaces after'
=>
{
input:
'<a href="javascript: alert(\'XSS\');">foo</a>'
,
output:
'<a>foo</a>'
},
'protocol-based JS injection: simple, spaces before and after'
=>
{
input:
'<a href="javascript : alert(\'XSS\');">foo</a>'
,
output:
'<a>foo</a>'
},
'protocol-based JS injection: preceding colon'
=>
{
input:
'<a href=":javascript:alert(\'XSS\');">foo</a>'
,
output:
'<a>foo</a>'
},
'protocol-based JS injection: UTF-8 encoding'
=>
{
input:
'<a href="javascript:">foo</a>'
,
output:
'<a>foo</a>'
},
'protocol-based JS injection: long UTF-8 encoding'
=>
{
input:
'<a href="javascript:">foo</a>'
,
output:
'<a>foo</a>'
},
'protocol-based JS injection: long UTF-8 encoding without semicolons'
=>
{
input:
'<a href=javascript:alert('XSS')>foo</a>'
,
output:
'<a>foo</a>'
},
'protocol-based JS injection: hex encoding'
=>
{
input:
'<a href="javascript:">foo</a>'
,
output:
'<a>foo</a>'
},
'protocol-based JS injection: long hex encoding'
=>
{
input:
'<a href="javascript:">foo</a>'
,
output:
'<a>foo</a>'
},
'protocol-based JS injection: hex encoding without semicolons'
=>
{
input:
'<a href=javascript:alert('XSS')>foo</a>'
,
output:
'<a>foo</a>'
},
'protocol-based JS injection: null char'
=>
{
input:
"<a href=java
\0
script:alert(
\"
XSS
\"
)>foo</a>"
,
output:
'<a href="java"></a>'
},
'protocol-based JS injection: spaces and entities'
=>
{
input:
'<a href="  javascript:alert(\'XSS\');">foo</a>'
,
output:
'<a href="">foo</a>'
},
}
protocols
.
each
do
|
name
,
data
|
it
"handles
#{
name
}
"
do
doc
=
filter
(
data
[
:input
])
expect
(
doc
.
to_html
).
to
eq
data
[
:output
]
end
end
it
'allows non-standard anchor schemes'
do
exp
=
%q{<a href="irc://irc.freenode.net/git">IRC</a>}
act
=
filter
(
exp
)
expect
(
act
.
to_html
).
to
eq
exp
end
it
'allows relative links'
do
exp
=
%q{<a href="foo/bar.md">foo/bar.md</a>}
act
=
filter
(
exp
)
expect
(
doc
.
css
(
'a'
).
size
).
to
eq
1
expect
(
doc
.
at_css
(
'a'
)[
'href'
]).
to
be_nil
expect
(
act
.
to_html
).
to
eq
exp
end
end
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment