67c3efbea0
according to https://tools.ietf.org/html/rfc3986#section-3 the colon is a required part of the syntax, other methods of achieving the colon character (as to browser interpretation) should be taken care of by htmlencoding that is done on all attribute content
2017-05-10 16:57:18 +01:00
bbb7687f31
safeMode will either apply all sanitisation techniques to an element or none (note that encoding HTML entities is done regardless because it speaks to character context, and that the only attributes/elements we should permit are the ones we actually mean to create)
2017-05-09 19:31:36 +01:00
b1e5aebaf6
add single safeMode option that encompasses protection from link destination xss and plain markup based xss into a single on/off switch
2017-05-09 19:22:58 +01:00
c63b690a79
remove duplicates
2017-05-09 14:50:15 +01:00
226f636360
remove $safe flag
2017-05-07 13:45:59 +01:00
2e4afde68d
faster check substr at beginning of string
2017-05-06 16:32:51 +01:00
dc30cb441c
add more protocols to the whitelist
2017-05-05 21:32:27 +01:00
054ba3c487
urlencode urls that are potentially unsafe:
...
this should break urls that attempt to include a protocol, or port (these are absolute URLs and should have a whitelisted protocol for use)
but URLs that are relative, or relative from the site root should be preserved (though characters non essential for the URL structure may be urlencoded)
this approach has significant advantages over attempting to locate something like `javascript:alert(1)` or `javascript:alert(1)` (which are both valid) because browsers have been known to ignore ridiculous characters when encountered (meaning something like `jav\ta\0\0script:alert(1)` would be xss :( ). Instead of trying to chase down a way to interpret a URL to decide whether there is a protocol, this approach ensures that two essential characters needed to achieve a colon are encoded `:` (obviously) and `;` (from `:`). If these characters appear in a relative URL then they are equivalent to their URL encoded form and so this change will be non breaking for that case.
2017-05-03 17:01:27 +01:00
4bae1c9834
whitelist regex for good attribute (no
...
no chars that could form a delimiter allowed
2017-05-03 00:39:01 +01:00
aee3963e6b
jpeg, not jpg
2017-05-02 19:55:03 +01:00
4dc98b635d
whitelist changes:
...
* add gif and jpg as allowed data images
* ensure that user controlled content fall only in the "data section" of the data URI (and does not intersect content-type definition in any way (best to be safe than sorry ;-)))
"data section" as defined in: https://tools.ietf.org/html/rfc2397#section-3
2017-05-02 19:48:25 +01:00
e4bb12329e
array_keys is probably faster
2017-05-02 01:32:24 +01:00
6d0156d707
dump attributes that contain characters that are impossible for validity, or very unlikely
2017-05-02 00:48:48 +01:00
131ba75851
filter onevent attributes
2017-05-01 15:44:04 +01:00
af04ac92e2
add xss tests
2017-05-01 03:33:49 +01:00
6bb66db00f
anti-xss
...
protect all attributes and content from xss via element method
filter special attributes (a href, img src)
expand url whitelist slightly to permit data images and mailto links
2017-05-01 03:25:07 +01:00
b3d45c4bb9
Add html escaping to all attributes capable of holding user input.
2017-05-01 02:00:38 +01:00
1d4296f34d
Customizable whitelist of schemas for safeLinks
2017-05-01 01:58:34 +01:00
bf5105cb1a
Improve safeLinks with whitelist.
2017-05-01 01:58:34 +01:00
1140613fc7
Prevent various XSS attacks
2017-05-01 01:58:34 +01:00
4367f89a74
attempt to fix failing builds on 5.3
2017-03-29 19:30:24 +03:00
1bf24f7334
add kbd to text-level elements
1.6.2
2017-03-29 19:04:15 +03:00
0a09d5ad45
update tests to reflect changes in phpunit 6.0
2017-03-23 20:21:18 +02:00
3fc442b078
Merge pull request #484 from hkdobrev/patch-1
...
Add Symfony demo to "Who uses it?"
2017-03-10 09:41:24 +02:00
bd0e31a7dd
Add Symfony demo to "Who uses it?"
...
409a65b373/composer.json (L24)
2017-03-10 01:04:53 +02:00
dfaf03639a
Merge pull request #480 from pjona/patch-1
...
Removed double semicolon
2017-03-08 23:21:03 +02:00
7081afe8cb
Removed double semicolon
2017-03-02 12:43:51 +01:00
4b6493999a
Merge pull request #465 from aidantwoods/patch-8
...
Trim surrounding whitespace from URL in inlineLink
2017-01-23 09:45:19 +02:00
0172d779d7
Trim surrounding whitespace from URL in inlineLink
...
Fixes https://github.com/erusev/parsedown-extra/issues/103
2017-01-21 11:06:41 +00:00
cc5b38ca39
Merge pull request #459 from gene-sis/fix_inlineLink_regex
...
fix_inlineLink_regex
2017-01-07 16:51:03 +02:00
48351504de
adjust two regex pattern within inlineLink() to reduce backtracking
...
add test with base64 image
2017-01-07 00:45:38 +01:00
20ff8bbb57
Merge pull request #447 from greut/phpunit-from-extra
...
Fix include from ParsedownTest
1.6.1
2016-11-02 17:56:58 +02:00
bc21988fe5
Fix include from ParsedownTest
...
I wasn't able to run all the tests from ParsedownExtra because of it.
2016-11-02 09:27:35 +01:00
e3c3e28554
Merge pull request #446 from jamesevickery/master
...
Grammar update
2016-10-25 17:39:55 +03:00
f053740132
Merge pull request #1 from erusev/master
...
Merge pull request #445 from jamesevickery/master
2016-10-25 15:24:11 +01:00
7a92a31739
Grammar update
2016-10-25 15:22:17 +01:00
6eca8796fb
Merge pull request #445 from jamesevickery/master
...
Tiny grammar correction
2016-10-25 17:21:57 +03:00
8876c0984e
Tiny grammar correction
2016-10-25 15:10:22 +01:00
cbc4b3f612
Merge pull request #436 from grogy/php71
...
Added PHP version 7.1 for tests
2016-10-09 13:04:16 +03:00
0080ef218e
Added PHP version 7.1 for tests
2016-10-09 01:58:47 +02:00
f4e0234af0
Merge pull request #431 from aidantwoods/patch-2
...
Allow parsedown to specify list start attribute
2016-10-05 22:55:34 +03:00
5c22531e4d
Allow parsedown to specify list start attribute
...
Syntax preferences
2016-10-05 18:27:54 +01:00
3978e33fd0
Allow parsedown to specify list start attribute
...
Remove github added tabs on blank lines
2016-10-05 18:17:12 +01:00
a37797ef34
Allow parsedown to specify list start attribute
...
Syntax preferences to match surrounding code
2016-10-05 18:15:47 +01:00
e3cd271f16
Allow parsedown to specify list start attribute
...
Performance: Swap preg_replace for stristr to obtain list start
2016-10-05 15:44:34 +01:00
f0b7b61c16
Allow parsedown to specify list start attribute
...
Should fix compatibility for PHP 5.3
2016-10-05 11:36:27 +01:00
ed41fcf3d6
Allow parsedown to specify list start attribute
...
oops
2016-10-05 10:06:40 +01:00
1fa8fae301
Allow parsedown to specify list start attribute
...
Readability improvements
2016-10-05 10:03:21 +01:00
932bafe0f0
update test for new feature
2016-10-04 17:43:37 +01:00
ac857809ab
update test for new feature
2016-10-04 17:41:57 +01:00