mirror of
https://github.com/Dolibarr/dolibarr.git
synced 2025-12-10 19:41:26 +01:00
Disallow use of &# into dol_sanitizeUrl()
This commit is contained in:
@@ -617,7 +617,7 @@ function GETPOST($paramname, $check = 'alphanohtml', $method = 0, $filter = null
|
||||
|
||||
do {
|
||||
$oldstringtoclean = $out;
|
||||
$out = str_ireplace(array('javascript', 'vbscript', '&colon', ':'), '', $out);
|
||||
$out = str_ireplace(array('javascript', 'vbscript', '&colon', '&#'), '', $out);
|
||||
} while ($oldstringtoclean != $out);
|
||||
|
||||
$out = preg_replace(array('/^[a-z]*\/\/+/i'), '', $out);
|
||||
@@ -1029,7 +1029,7 @@ function dol_sanitizeUrl($stringtoclean, $type = 1)
|
||||
do {
|
||||
$oldstringtoclean = $stringtoclean;
|
||||
|
||||
$stringtoclean = str_ireplace(array('javascript', 'vbscript', '&colon', ':'), '', $stringtoclean);
|
||||
$stringtoclean = str_ireplace(array('javascript', 'vbscript', '&colon', '&#'), '', $stringtoclean);
|
||||
} while ($oldstringtoclean != $stringtoclean);
|
||||
|
||||
if ($type == 1) {
|
||||
|
||||
@@ -476,7 +476,7 @@ class SecurityTest extends PHPUnit\Framework\TestCase
|
||||
$_POST["backtopage"]='javascripT&javascript#javascriptxjavascript3a alert(1)';
|
||||
$result=GETPOST("backtopage");
|
||||
print __METHOD__." result=".$result."\n";
|
||||
$this->assertEquals(' alert(1)', $result, 'Test for backtopage param');
|
||||
$this->assertEquals('3a alert(1)', $result, 'Test for backtopage param');
|
||||
|
||||
return $result;
|
||||
}
|
||||
@@ -691,7 +691,7 @@ class SecurityTest extends PHPUnit\Framework\TestCase
|
||||
|
||||
$test = 'javascripT&javascript#x3a alert(1)';
|
||||
$result=dol_sanitizeUrl($test);
|
||||
$this->assertEquals(' alert(1)', $result, 'Test on dol_sanitizeUrl A');
|
||||
$this->assertEquals('3a alert(1)', $result, 'Test on dol_sanitizeUrl A');
|
||||
|
||||
$test = 'javajavascriptscript&cjavascriptolon;alert(1)';
|
||||
$result=dol_sanitizeUrl($test);
|
||||
|
||||
Reference in New Issue
Block a user