gtsocial-umbx

Unnamed repository; edit this file 'description' to name the repository.
Log | Files | Refs | README | LICENSE

README.md (19486B)


      1 # bluemonday [![GoDoc](https://godoc.org/github.com/microcosm-cc/bluemonday?status.png)](https://godoc.org/github.com/microcosm-cc/bluemonday) [![Sourcegraph](https://sourcegraph.com/github.com/microcosm-cc/bluemonday/-/badge.svg)](https://sourcegraph.com/github.com/microcosm-cc/bluemonday?badge)
      2 
      3 bluemonday is a HTML sanitizer implemented in Go. It is fast and highly configurable.
      4 
      5 bluemonday takes untrusted user generated content as an input, and will return HTML that has been sanitised against an allowlist of approved HTML elements and attributes so that you can safely include the content in your web page.
      6 
      7 If you accept user generated content, and your server uses Go, you **need** bluemonday.
      8 
      9 The default policy for user generated content (`bluemonday.UGCPolicy().Sanitize()`) turns this:
     10 ```html
     11 Hello <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>World
     12 ```
     13 
     14 Into a harmless:
     15 ```html
     16 Hello World
     17 ```
     18 
     19 And it turns this:
     20 ```html
     21 <a href="javascript:alert('XSS1')" onmouseover="alert('XSS2')">XSS<a>
     22 ```
     23 
     24 Into this:
     25 ```html
     26 XSS
     27 ```
     28 
     29 Whilst still allowing this:
     30 ```html
     31 <a href="http://www.google.com/">
     32   <img src="https://ssl.gstatic.com/accounts/ui/logo_2x.png"/>
     33 </a>
     34 ```
     35 
     36 To pass through mostly unaltered (it gained a rel="nofollow" which is a good thing for user generated content):
     37 ```html
     38 <a href="http://www.google.com/" rel="nofollow">
     39   <img src="https://ssl.gstatic.com/accounts/ui/logo_2x.png"/>
     40 </a>
     41 ```
     42 
     43 It protects sites from [XSS](http://en.wikipedia.org/wiki/Cross-site_scripting) attacks. There are many [vectors for an XSS attack](https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet) and the best way to mitigate the risk is to sanitize user input against a known safe list of HTML elements and attributes.
     44 
     45 You should **always** run bluemonday **after** any other processing.
     46 
     47 If you use [blackfriday](https://github.com/russross/blackfriday) or [Pandoc](http://johnmacfarlane.net/pandoc/) then bluemonday should be run after these steps. This ensures that no insecure HTML is introduced later in your process.
     48 
     49 bluemonday is heavily inspired by both the [OWASP Java HTML Sanitizer](https://code.google.com/p/owasp-java-html-sanitizer/) and the [HTML Purifier](http://htmlpurifier.org/).
     50 
     51 ## Technical Summary
     52 
     53 Allowlist based, you need to either build a policy describing the HTML elements and attributes to permit (and the `regexp` patterns of attributes), or use one of the supplied policies representing good defaults.
     54 
     55 The policy containing the allowlist is applied using a fast non-validating, forward only, token-based parser implemented in the [Go net/html library](https://godoc.org/golang.org/x/net/html) by the core Go team.
     56 
     57 We expect to be supplied with well-formatted HTML (closing elements for every applicable open element, nested correctly) and so we do not focus on repairing badly nested or incomplete HTML. We focus on simply ensuring that whatever elements do exist are described in the policy allowlist and that attributes and links are safe for use on your web page. [GIGO](http://en.wikipedia.org/wiki/Garbage_in,_garbage_out) does apply and if you feed it bad HTML bluemonday is not tasked with figuring out how to make it good again.
     58 
     59 ### Supported Go Versions
     60 
     61 bluemonday is tested on all versions since Go 1.2 including tip.
     62 
     63 We do not support Go 1.0 as we depend on `golang.org/x/net/html` which includes a reference to `io.ErrNoProgress` which did not exist in Go 1.0.
     64 
     65 We support Go 1.1 but Travis no longer tests against it.
     66 
     67 ## Is it production ready?
     68 
     69 *Yes*
     70 
     71 We are using bluemonday in production having migrated from the widely used and heavily field tested OWASP Java HTML Sanitizer.
     72 
     73 We are passing our extensive test suite (including AntiSamy tests as well as tests for any issues raised). Check for any [unresolved issues](https://github.com/microcosm-cc/bluemonday/issues?page=1&state=open) to see whether anything may be a blocker for you.
     74 
     75 We invite pull requests and issues to help us ensure we are offering comprehensive protection against various attacks via user generated content.
     76 
     77 ## Usage
     78 
     79 Install in your `${GOPATH}` using `go get -u github.com/microcosm-cc/bluemonday`
     80 
     81 Then call it:
     82 ```go
     83 package main
     84 
     85 import (
     86 	"fmt"
     87 
     88 	"github.com/microcosm-cc/bluemonday"
     89 )
     90 
     91 func main() {
     92 	// Do this once for each unique policy, and use the policy for the life of the program
     93 	// Policy creation/editing is not safe to use in multiple goroutines
     94 	p := bluemonday.UGCPolicy()
     95 
     96 	// The policy can then be used to sanitize lots of input and it is safe to use the policy in multiple goroutines
     97 	html := p.Sanitize(
     98 		`<a onblur="alert(secret)" href="http://www.google.com">Google</a>`,
     99 	)
    100 
    101 	// Output:
    102 	// <a href="http://www.google.com" rel="nofollow">Google</a>
    103 	fmt.Println(html)
    104 }
    105 ```
    106 
    107 We offer three ways to call Sanitize:
    108 ```go
    109 p.Sanitize(string) string
    110 p.SanitizeBytes([]byte) []byte
    111 p.SanitizeReader(io.Reader) bytes.Buffer
    112 ```
    113 
    114 If you are obsessed about performance, `p.SanitizeReader(r).Bytes()` will return a `[]byte` without performing any unnecessary casting of the inputs or outputs. Though the difference is so negligible you should never need to care.
    115 
    116 You can build your own policies:
    117 ```go
    118 package main
    119 
    120 import (
    121 	"fmt"
    122 
    123 	"github.com/microcosm-cc/bluemonday"
    124 )
    125 
    126 func main() {
    127 	p := bluemonday.NewPolicy()
    128 
    129 	// Require URLs to be parseable by net/url.Parse and either:
    130 	//   mailto: http:// or https://
    131 	p.AllowStandardURLs()
    132 
    133 	// We only allow <p> and <a href="">
    134 	p.AllowAttrs("href").OnElements("a")
    135 	p.AllowElements("p")
    136 
    137 	html := p.Sanitize(
    138 		`<a onblur="alert(secret)" href="http://www.google.com">Google</a>`,
    139 	)
    140 
    141 	// Output:
    142 	// <a href="http://www.google.com">Google</a>
    143 	fmt.Println(html)
    144 }
    145 ```
    146 
    147 We ship two default policies:
    148 
    149 1. `bluemonday.StrictPolicy()` which can be thought of as equivalent to stripping all HTML elements and their attributes as it has nothing on its allowlist. An example usage scenario would be blog post titles where HTML tags are not expected at all and if they are then the elements *and* the content of the elements should be stripped. This is a *very* strict policy.
    150 2. `bluemonday.UGCPolicy()` which allows a broad selection of HTML elements and attributes that are safe for user generated content. Note that this policy does *not* allow iframes, object, embed, styles, script, etc. An example usage scenario would be blog post bodies where a variety of formatting is expected along with the potential for TABLEs and IMGs.
    151 
    152 ## Policy Building
    153 
    154 The essence of building a policy is to determine which HTML elements and attributes are considered safe for your scenario. OWASP provide an [XSS prevention cheat sheet](https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet) to help explain the risks, but essentially:
    155 
    156 1. Avoid anything other than the standard HTML elements
    157 1. Avoid `script`, `style`, `iframe`, `object`, `embed`, `base` elements that allow code to be executed by the client or third party content to be included that can execute code
    158 1. Avoid anything other than plain HTML attributes with values matched to a regexp
    159 
    160 Basically, you should be able to describe what HTML is fine for your scenario. If you do not have confidence that you can describe your policy please consider using one of the shipped policies such as `bluemonday.UGCPolicy()`.
    161 
    162 To create a new policy:
    163 ```go
    164 p := bluemonday.NewPolicy()
    165 ```
    166 
    167 To add elements to a policy either add just the elements:
    168 ```go
    169 p.AllowElements("b", "strong")
    170 ```
    171 
    172 Or using a regex:
    173 
    174 _Note: if an element is added by name as shown above, any matching regex will be ignored_
    175 
    176 It is also recommended to ensure multiple patterns don't overlap as order of execution is not guaranteed and can result in some rules being missed.
    177 ```go
    178 p.AllowElementsMatching(regex.MustCompile(`^my-element-`))
    179 ```
    180 
    181 Or add elements as a virtue of adding an attribute:
    182 ```go
    183 // Note the recommended pattern, see the recommendation on using .Matching() below
    184 p.AllowAttrs("nowrap").OnElements("td", "th")
    185 ```
    186 
    187 Again, this also supports a regex pattern match alternative:
    188 ```go
    189 p.AllowAttrs("nowrap").OnElementsMatching(regex.MustCompile(`^my-element-`))
    190 ```
    191 
    192 Attributes can either be added to all elements:
    193 ```go
    194 p.AllowAttrs("dir").Matching(regexp.MustCompile("(?i)rtl|ltr")).Globally()
    195 ```
    196 
    197 Or attributes can be added to specific elements:
    198 ```go
    199 // Not the recommended pattern, see the recommendation on using .Matching() below
    200 p.AllowAttrs("value").OnElements("li")
    201 ```
    202 
    203 It is **always** recommended that an attribute be made to match a pattern. XSS in HTML attributes is very easy otherwise:
    204 ```go
    205 // \p{L} matches unicode letters, \p{N} matches unicode numbers
    206 p.AllowAttrs("title").Matching(regexp.MustCompile(`[\p{L}\p{N}\s\-_',:\[\]!\./\\\(\)&]*`)).Globally()
    207 ```
    208 
    209 You can stop at any time and call .Sanitize():
    210 ```go
    211 // string htmlIn passed in from a HTTP POST
    212 htmlOut := p.Sanitize(htmlIn)
    213 ```
    214 
    215 And you can take any existing policy and extend it:
    216 ```go
    217 p := bluemonday.UGCPolicy()
    218 p.AllowElements("fieldset", "select", "option")
    219 ```
    220 
    221 ### Inline CSS
    222 
    223 Although it's possible to handle inline CSS using `AllowAttrs` with a `Matching` rule, writing a single monolithic regular expression to safely process all inline CSS which you wish to allow is not a trivial task.  Instead of attempting to do so, you can allow the `style` attribute on whichever element(s) you desire and use style policies to control and sanitize inline styles.
    224 
    225 It is strongly recommended that you use `Matching` (with a suitable regular expression)
    226 `MatchingEnum`, or `MatchingHandler` to ensure each style matches your needs,
    227 but default handlers are supplied for most widely used styles.
    228 
    229 Similar to attributes, you can allow specific CSS properties to be set inline:
    230 ```go
    231 p.AllowAttrs("style").OnElements("span", "p")
    232 // Allow the 'color' property with valid RGB(A) hex values only (on any element allowed a 'style' attribute)
    233 p.AllowStyles("color").Matching(regexp.MustCompile("(?i)^#([0-9a-f]{3,4}|[0-9a-f]{6}|[0-9a-f]{8})$")).Globally()
    234 ```
    235 
    236 Additionally, you can allow a CSS property to be set only to an allowed value:
    237 ```go
    238 p.AllowAttrs("style").OnElements("span", "p")
    239 // Allow the 'text-decoration' property to be set to 'underline', 'line-through' or 'none'
    240 // on 'span' elements only
    241 p.AllowStyles("text-decoration").MatchingEnum("underline", "line-through", "none").OnElements("span")
    242 ```
    243 
    244 Or you can specify elements based on a regex pattern match:
    245 ```go
    246 p.AllowAttrs("style").OnElementsMatching(regex.MustCompile(`^my-element-`))
    247 // Allow the 'text-decoration' property to be set to 'underline', 'line-through' or 'none'
    248 // on 'span' elements only
    249 p.AllowStyles("text-decoration").MatchingEnum("underline", "line-through", "none").OnElementsMatching(regex.MustCompile(`^my-element-`))
    250 ```
    251 
    252 If you need more specific checking, you can create a handler that takes in a string and returns a bool to
    253 validate the values for a given property. The string parameter has been
    254 converted to lowercase and unicode code points have been converted.
    255 ```go
    256 myHandler := func(value string) bool{
    257 	// Validate your input here
    258 	return true
    259 }
    260 p.AllowAttrs("style").OnElements("span", "p")
    261 // Allow the 'color' property with values validated by the handler (on any element allowed a 'style' attribute)
    262 p.AllowStyles("color").MatchingHandler(myHandler).Globally()
    263 ```
    264 
    265 ### Links
    266 
    267 Links are difficult beasts to sanitise safely and also one of the biggest attack vectors for malicious content.
    268 
    269 It is possible to do this:
    270 ```go
    271 p.AllowAttrs("href").Matching(regexp.MustCompile(`(?i)mailto|https?`)).OnElements("a")
    272 ```
    273 
    274 But that will not protect you as the regular expression is insufficient in this case to have prevented a malformed value doing something unexpected.
    275 
    276 We provide some additional global options for safely working with links.
    277 
    278 `RequireParseableURLs` will ensure that URLs are parseable by Go's `net/url` package:
    279 ```go
    280 p.RequireParseableURLs(true)
    281 ```
    282 
    283 If you have enabled parseable URLs then the following option will `AllowRelativeURLs`. By default this is disabled (bluemonday is an allowlist tool... you need to explicitly tell us to permit things) and when disabled it will prevent all local and scheme relative URLs (i.e. `href="localpage.html"`, `href="../home.html"` and even `href="//www.google.com"` are relative):
    284 ```go
    285 p.AllowRelativeURLs(true)
    286 ```
    287 
    288 If you have enabled parseable URLs then you can allow the schemes (commonly called protocol when thinking of `http` and `https`) that are permitted. Bear in mind that allowing relative URLs in the above option will allow for a blank scheme:
    289 ```go
    290 p.AllowURLSchemes("mailto", "http", "https")
    291 ```
    292 
    293 Regardless of whether you have enabled parseable URLs, you can force all URLs to have a rel="nofollow" attribute. This will be added if it does not exist, but only when the `href` is valid:
    294 ```go
    295 // This applies to "a" "area" "link" elements that have a "href" attribute
    296 p.RequireNoFollowOnLinks(true)
    297 ```
    298 
    299 Similarly, you can force all URLs to have "noreferrer" in their rel attribute.
    300 ```go
    301 // This applies to "a" "area" "link" elements that have a "href" attribute
    302 p.RequireNoReferrerOnLinks(true)
    303 ```
    304 
    305 
    306 We provide a convenience method that applies all of the above, but you will still need to allow the linkable elements for the URL rules to be applied to:
    307 ```go
    308 p.AllowStandardURLs()
    309 p.AllowAttrs("cite").OnElements("blockquote", "q")
    310 p.AllowAttrs("href").OnElements("a", "area")
    311 p.AllowAttrs("src").OnElements("img")
    312 ```
    313 
    314 An additional complexity regarding links is the data URI as defined in [RFC2397](http://tools.ietf.org/html/rfc2397). The data URI allows for images to be served inline using this format:
    315 
    316 ```html
    317 <img src="data:image/webp;base64,UklGRh4AAABXRUJQVlA4TBEAAAAvAAAAAAfQ//73v/+BiOh/AAA=">
    318 ```
    319 
    320 We have provided a helper to verify the mimetype followed by base64 content of data URIs links:
    321 
    322 ```go
    323 p.AllowDataURIImages()
    324 ```
    325 
    326 That helper will enable GIF, JPEG, PNG and WEBP images.
    327 
    328 It should be noted that there is a potential [security](http://palizine.plynt.com/issues/2010Oct/bypass-xss-filters/) [risk](https://capec.mitre.org/data/definitions/244.html) with the use of data URI links. You should only enable data URI links if you already trust the content.
    329 
    330 We also have some features to help deal with user generated content:
    331 ```go
    332 p.AddTargetBlankToFullyQualifiedLinks(true)
    333 ```
    334 
    335 This will ensure that anchor `<a href="" />` links that are fully qualified (the href destination includes a host name) will get `target="_blank"` added to them.
    336 
    337 Additionally any link that has `target="_blank"` after the policy has been applied will also have the `rel` attribute adjusted to add `noopener`. This means a link may start like `<a href="//host/path"/>` and will end up as `<a href="//host/path" rel="noopener" target="_blank">`. It is important to note that the addition of `noopener` is a security feature and not an issue. There is an unfortunate feature to browsers that a browser window opened as a result of `target="_blank"` can still control the opener (your web page) and this protects against that. The background to this can be found here: [https://dev.to/ben/the-targetblank-vulnerability-by-example](https://dev.to/ben/the-targetblank-vulnerability-by-example)
    338 
    339 ### Policy Building Helpers
    340 
    341 We also bundle some helpers to simplify policy building:
    342 ```go
    343 
    344 // Permits the "dir", "id", "lang", "title" attributes globally
    345 p.AllowStandardAttributes()
    346 
    347 // Permits the "img" element and its standard attributes
    348 p.AllowImages()
    349 
    350 // Permits ordered and unordered lists, and also definition lists
    351 p.AllowLists()
    352 
    353 // Permits HTML tables and all applicable elements and non-styling attributes
    354 p.AllowTables()
    355 ```
    356 
    357 ### Invalid Instructions
    358 
    359 The following are invalid:
    360 ```go
    361 // This does not say where the attributes are allowed, you need to add
    362 // .Globally() or .OnElements(...)
    363 // This will be ignored without error.
    364 p.AllowAttrs("value")
    365 
    366 // This does not say where the attributes are allowed, you need to add
    367 // .Globally() or .OnElements(...)
    368 // This will be ignored without error.
    369 p.AllowAttrs(
    370 	"type",
    371 ).Matching(
    372 	regexp.MustCompile("(?i)^(circle|disc|square|a|A|i|I|1)$"),
    373 )
    374 ```
    375 
    376 Both examples exhibit the same issue, they declare attributes but do not then specify whether they are allowed globally or only on specific elements (and which elements). Attributes belong to one or more elements, and the policy needs to declare this.
    377 
    378 ## Limitations
    379 
    380 We are not yet including any tools to help allow and sanitize CSS. Which means that unless you wish to do the heavy lifting in a single regular expression (inadvisable), **you should not allow the "style" attribute anywhere**.
    381 
    382 In the same theme, both `<script>` and `<style>` are considered harmful. These elements (and their content) will not be rendered by default, and require you to explicitly set `p.AllowUnsafe(true)`. You should be aware that allowing these elements defeats the purpose of using a HTML sanitizer as you would be explicitly allowing either JavaScript (and any plainly written XSS) and CSS (which can modify a DOM to insert JS), and additionally but limitations in this library mean it is not aware of whether HTML is validly structured and that can allow these elements to bypass some of the safety mechanisms built into the [WhatWG HTML parser standard](https://html.spec.whatwg.org/multipage/parsing.html#parsing-main-inselect).
    383 
    384 It is not the job of bluemonday to fix your bad HTML, it is merely the job of bluemonday to prevent malicious HTML getting through. If you have mismatched HTML elements, or non-conforming nesting of elements, those will remain. But if you have well-structured HTML bluemonday will not break it.
    385 
    386 ## TODO
    387 
    388 * Investigate whether devs want to blacklist elements and attributes. This would allow devs to take an existing policy (such as the `bluemonday.UGCPolicy()` ) that encapsulates 90% of what they're looking for but does more than they need, and to remove the extra things they do not want to make it 100% what they want
    389 * Investigate whether devs want a validating HTML mode, in which the HTML elements are not just transformed into a balanced tree (every start tag has a closing tag at the correct depth) but also that elements and character data appear only in their allowed context (i.e. that a `table` element isn't a descendent of a `caption`, that `colgroup`, `thead`, `tbody`, `tfoot` and `tr` are permitted, and that character data is not permitted)
    390 
    391 ## Development
    392 
    393 If you have cloned this repo you will probably need the dependency:
    394 
    395 `go get golang.org/x/net/html`
    396 
    397 Gophers can use their familiar tools:
    398 
    399 `go build`
    400 
    401 `go test`
    402 
    403 I personally use a Makefile as it spares typing the same args over and over whilst providing consistency for those of us who jump from language to language and enjoy just typing `make` in a project directory and watch magic happen.
    404 
    405 `make` will build, vet, test and install the library.
    406 
    407 `make clean` will remove the library from a *single* `${GOPATH}/pkg` directory tree
    408 
    409 `make test` will run the tests
    410 
    411 `make cover` will run the tests and *open a browser window* with the coverage report
    412 
    413 `make lint` will run golint (install via `go get github.com/golang/lint/golint`)
    414 
    415 ## Long term goals
    416 
    417 1. Open the code to adversarial peer review similar to the [Attack Review Ground Rules](https://code.google.com/p/owasp-java-html-sanitizer/wiki/AttackReviewGroundRules)
    418 1. Raise funds and pay for an external security review