Update wp_kses_bad_protocol()
to recognize :
on uri attributes,
`wp_kses_bad_protocol()` makes sure to validate that uri attributes don’t contain invalid/or not allowed protocols. While this works fine in most cases, there’s a risk that by using the colon html5 named entity, one is able to bypass this function. Props: xknown, nickdaugherty, peterwilsoncc. git-svn-id: https://develop.svn.wordpress.org/trunk@46895 602fd350-edb4-49c9-b593-d223f7449a82
This commit is contained in:
parent
dcab984b1b
commit
39a8eacb5f
@ -1665,7 +1665,7 @@ function wp_kses_html_error( $string ) {
|
|||||||
*/
|
*/
|
||||||
function wp_kses_bad_protocol_once( $string, $allowed_protocols, $count = 1 ) {
|
function wp_kses_bad_protocol_once( $string, $allowed_protocols, $count = 1 ) {
|
||||||
$string = preg_replace( '/(�*58(?![;0-9])|�*3a(?![;a-f0-9]))/i', '$1;', $string );
|
$string = preg_replace( '/(�*58(?![;0-9])|�*3a(?![;a-f0-9]))/i', '$1;', $string );
|
||||||
$string2 = preg_split( '/:|�*58;|�*3a;/i', $string, 2 );
|
$string2 = preg_split( '/:|�*58;|�*3a;|:/i', $string, 2 );
|
||||||
if ( isset( $string2[1] ) && ! preg_match( '%/\?%', $string2[0] ) ) {
|
if ( isset( $string2[1] ) && ! preg_match( '%/\?%', $string2[0] ) ) {
|
||||||
$string = trim( $string2[1] );
|
$string = trim( $string2[1] );
|
||||||
$protocol = wp_kses_bad_protocol_once2( $string2[0], $allowed_protocols );
|
$protocol = wp_kses_bad_protocol_once2( $string2[0], $allowed_protocols );
|
||||||
|
@ -179,6 +179,28 @@ EOF;
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
$bad_not_normalized = array(
|
||||||
|
'dummy:alert(1)',
|
||||||
|
'javascript:alert(1)',
|
||||||
|
'javascript&CoLon;alert(1)',
|
||||||
|
'javascript:alert(1);',
|
||||||
|
'javascript:alert(1);',
|
||||||
|
'javascript:alert(1);',
|
||||||
|
'javascript:alert(1);',
|
||||||
|
'jav ascript:alert(1);',
|
||||||
|
'javascript:javascript:alert(1);',
|
||||||
|
'javascript:javascript:alert(1);',
|
||||||
|
'javascript:javascript:alert(1);',
|
||||||
|
'javascript:javascript:alert(1);',
|
||||||
|
'javascript:alert(1)',
|
||||||
|
);
|
||||||
|
foreach ( $bad_not_normalized as $k => $x ) {
|
||||||
|
$result = wp_kses_bad_protocol( $x, wp_allowed_protocols() );
|
||||||
|
if ( ! empty( $result ) && 'alert(1);' !== $result && 'alert(1)' !== $result ) {
|
||||||
|
$this->fail( "wp_kses_bad_protocol failed on $k, $x. Result: $result" );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
$safe = array(
|
$safe = array(
|
||||||
'dummy:alert(1)',
|
'dummy:alert(1)',
|
||||||
'HTTP://example.org/',
|
'HTTP://example.org/',
|
||||||
|
Loading…
Reference in New Issue
Block a user