162 lines
6.2 KiB
Markdown
162 lines
6.2 KiB
Markdown
[](https://travis-ci.org/voku/anti-xss)
|
|
[](http://codecov.io/github/voku/anti-xss?branch=master)
|
|
[](https://www.codacy.com/app/voku/anti-xss)
|
|
[](https://packagist.org/packages/voku/anti-xss)
|
|
[](https://packagist.org/packages/voku/anti-xss)
|
|
[](https://packagist.org/packages/voku/anti-xss)
|
|
[](https://www.paypal.me/moelleken)
|
|
[](https://www.patreon.com/voku)
|
|
|
|
# :secret: AntiXSS
|
|
|
|
"Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications. XSS enables
|
|
attackers to inject client-side script into Web pages viewed by other users. A cross-site scripting vulnerability may be
|
|
used by attackers to bypass access controls such as the same origin policy. Cross-site scripting carried out on websites
|
|
accounted for roughly 84% of all security vulnerabilities documented by Symantec as of 2007." - http://en.wikipedia.org/wiki/Cross-site_scripting
|
|
|
|
### DEMO:
|
|
[http://anti-xss-demo.suckup.de/](http://anti-xss-demo.suckup.de/)
|
|
|
|
### NOTES:
|
|
1) Use [filter_input()](http://php.net/manual/de/function.filter-input.php) - don't use GLOBAL-Array (e.g. $_SESSION, $_GET, $_POST, $_SERVER) directly
|
|
|
|
2) Use [html-sanitizer](https://github.com/tgalopin/html-sanitizer) or [HTML Purifier](http://htmlpurifier.org/) if you need a more configurable solution
|
|
|
|
3) Add "Content Security Policy's" -> [Introduction to Content Security Policy](http://www.html5rocks.com/en/tutorials/security/content-security-policy/)
|
|
|
|
4) DO NOT WRITE YOUR OWN REGEX TO PARSE HTML!
|
|
|
|
5) READ THIS TEXT -> [XSS (Cross Site Scripting) Prevention Cheat Sheet](https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md)
|
|
|
|
6) TEST THIS TOOL -> [Zed Attack Proxy (ZAP)](https://github.com/zaproxy/zaproxy)
|
|
|
|
### Install via "composer require"
|
|
```shell
|
|
composer require voku/anti-xss
|
|
```
|
|
|
|
### Usage:
|
|
|
|
```php
|
|
|
|
use voku\helper\AntiXSS;
|
|
|
|
require_once __DIR__ . '/vendor/autoload.php'; // example path
|
|
|
|
$antiXss = new AntiXSS();
|
|
```
|
|
|
|
Example 1: (HTML Character)
|
|
|
|
```php
|
|
$harm_string = "Hello, i try to <script>alert('Hack');</script> your site";
|
|
$harmless_string = $antiXss->xss_clean($harm_string);
|
|
|
|
// Hello, i try to alert('Hack'); your site
|
|
```
|
|
|
|
Example 2: (Hexadecimal HTML Character)
|
|
|
|
```php
|
|
$harm_string = "<IMG SRC=javascript:alert('XSS')>";
|
|
$harmless_string = $antiXss->xss_clean($harm_string);
|
|
|
|
// <IMG >
|
|
```
|
|
|
|
Example 3: (Unicode Hex Character)
|
|
|
|
```php
|
|
$harm_string = "<a href=' javascript:alert(1)'>CLICK</a>";
|
|
$harmless_string = $antiXss->xss_clean($harm_string);
|
|
|
|
// <a >CLICK</a>
|
|
```
|
|
|
|
Example 4: (Unicode Character)
|
|
|
|
```php
|
|
$harm_string = "<a href=\"\u0001java\u0003script:alert(1)\">CLICK<a>";
|
|
$harmless_string = $antiXss->xss_clean($harm_string);
|
|
|
|
// <a >CLICK</a>
|
|
```
|
|
|
|
Example 5.1: (non Inline CSS)
|
|
|
|
```php
|
|
$harm_string = '<li style="list-style-image: url(javascript:alert(0))">';
|
|
$harmless_string = $antiXss->xss_clean($harm_string);
|
|
|
|
// <li >
|
|
```
|
|
|
|
Example 5.2: (with Inline CSS)
|
|
|
|
```php
|
|
$harm_string = '<li style="list-style-image: url(javascript:alert(0))">';
|
|
$antiXss->removeEvilAttributes(array('style')); // allow style-attributes
|
|
$harmless_string = $antiXss->xss_clean($harm_string);
|
|
|
|
// <li style="list-style-image: url(alert(0))">
|
|
```
|
|
|
|
Example 6: (check if an string contains a XSS attack)
|
|
|
|
```php
|
|
$harm_string = "\x3cscript src=http://www.example.com/malicious-code.js\x3e\x3c/script\x3e";
|
|
$harmless_string = $antiXss->xss_clean($harm_string);
|
|
|
|
//
|
|
|
|
$antiXss->isXssFound();
|
|
|
|
// true
|
|
```
|
|
|
|
Example 7: (allow e.g. iframes)
|
|
|
|
```php
|
|
$harm_string = "<iframe width="560" onclick="alert('xss')" height="315" src="https://www.youtube.com/embed/foobar?rel=0&controls=0&showinfo=0" frameborder="0" allowfullscreen></iframe>";
|
|
|
|
$antiXss->removeEvilHtmlTags(array('iframe'));
|
|
|
|
$harmless_string = $antiXss->xss_clean($harm_string);
|
|
|
|
// <iframe width="560" height="315" src="https://www.youtube.com/embed/foobar?rel=0&controls=0&showinfo=0" frameborder="0" allowfullscreen></iframe>
|
|
```
|
|
|
|
|
|
### Unit Test:
|
|
|
|
1) [Composer](https://getcomposer.org) is a prerequisite for running the tests.
|
|
|
|
```
|
|
composer install
|
|
```
|
|
|
|
2) The tests can be executed by running this command from the root directory:
|
|
|
|
```bash
|
|
./vendor/bin/phpunit
|
|
```
|
|
|
|
### Support
|
|
|
|
For support and donations please visit [Github](https://github.com/voku/anti-xss/) | [Issues](https://github.com/voku/anti-xss/issues) | [PayPal](https://paypal.me/moelleken) | [Patreon](https://www.patreon.com/voku).
|
|
|
|
For status updates and release announcements please visit [Releases](https://github.com/voku/anti-xss/releases) | [Twitter](https://twitter.com/suckup_de) | [Patreon](https://www.patreon.com/voku/posts).
|
|
|
|
For professional support please contact [me](https://about.me/voku).
|
|
|
|
### Thanks
|
|
|
|
- Thanks to [GitHub](https://github.com) (Microsoft) for hosting the code and a good infrastructure including Issues-Managment, etc.
|
|
- Thanks to [IntelliJ](https://www.jetbrains.com) as they make the best IDEs for PHP and they gave me an open source license for PhpStorm!
|
|
- Thanks to [Travis CI](https://travis-ci.com/) for being the most awesome, easiest continous integration tool out there!
|
|
- Thanks to [StyleCI](https://styleci.io/) for the simple but powerfull code style check.
|
|
- Thanks to [PHPStan](https://github.com/phpstan/phpstan) && [Psalm](https://github.com/vimeo/psalm) for relly great Static analysis tools and for discover bugs in the code!
|
|
|
|
### License
|
|
[](https://app.fossa.io/projects/git%2Bgithub.com%2Fvoku%2Fanti-xss?ref=badge_large)
|