class RequestSanitizer

Same name in other branches
  1. 8.9.x core/lib/Drupal/Core/Security/RequestSanitizer.php \Drupal\Core\Security\RequestSanitizer
  2. 10 core/lib/Drupal/Core/Security/RequestSanitizer.php \Drupal\Core\Security\RequestSanitizer
  3. 11.x core/lib/Drupal/Core/Security/RequestSanitizer.php \Drupal\Core\Security\RequestSanitizer

Sanitizes user input.

Hierarchy

Expanded class hierarchy of RequestSanitizer

2 files declare their use of RequestSanitizer
DrupalKernel.php in core/lib/Drupal/Core/DrupalKernel.php
RequestSanitizerTest.php in core/tests/Drupal/Tests/Core/Security/RequestSanitizerTest.php

File

core/lib/Drupal/Core/Security/RequestSanitizer.php, line 12

Namespace

Drupal\Core\Security
View source
class RequestSanitizer {
    
    /**
     * Request attribute to mark the request as sanitized.
     */
    const SANITIZED = '_drupal_request_sanitized';
    
    /**
     * The name of the setting that configures the sanitize input safe keys.
     */
    const SANITIZE_INPUT_SAFE_KEYS = 'sanitize_input_safe_keys';
    
    /**
     * Previous name of SANITIZE_INPUT_SAFE_KEYS.
     *
     * @deprecated in drupal:9.1.0 and is removed from drupal:10.0.0. Use
     *   SANITIZE_INPUT_SAFE_KEYS instead.
     * @see https://www.drupal.org/node/3163148
     */
    const SANITIZE_WHITELIST = 'sanitize_input_whitelist';
    
    /**
     * The name of the setting that determines if sanitized keys are logged.
     */
    const SANITIZE_LOG = 'sanitize_input_logging';
    
    /**
     * Strips dangerous keys from user input.
     *
     * @param \Symfony\Component\HttpFoundation\Request $request
     *   The incoming request to sanitize.
     * @param string[] $safe_keys
     *   An array of keys to consider safe.
     * @param bool $log_sanitized_keys
     *   (optional) Set to TRUE to log keys that are sanitized.
     *
     * @return \Symfony\Component\HttpFoundation\Request
     *   The sanitized request.
     */
    public static function sanitize(Request $request, array $safe_keys, $log_sanitized_keys = FALSE) {
        if (!$request->attributes
            ->get(self::SANITIZED, FALSE)) {
            $update_globals = FALSE;
            $bags = [
                'query' => 'Potentially unsafe keys removed from query string parameters (GET): %s',
                'request' => 'Potentially unsafe keys removed from request body parameters (POST): %s',
                'cookies' => 'Potentially unsafe keys removed from cookie parameters: %s',
            ];
            foreach ($bags as $bag => $message) {
                if (static::processParameterBag($request->{$bag}, $safe_keys, $log_sanitized_keys, $bag, $message)) {
                    $update_globals = TRUE;
                }
            }
            if ($update_globals) {
                $request->overrideGlobals();
            }
            $request->attributes
                ->set(self::SANITIZED, TRUE);
        }
        return $request;
    }
    
    /**
     * Processes a request parameter bag.
     *
     * @param \Symfony\Component\HttpFoundation\ParameterBag $bag
     *   The parameter bag to process.
     * @param string[] $safe_keys
     *   An array of keys to consider safe.
     * @param bool $log_sanitized_keys
     *   Set to TRUE to log keys that are sanitized.
     * @param string $bag_name
     *   The request parameter bag name. Either 'query', 'request' or 'cookies'.
     * @param string $message
     *   The message to log if the parameter bag contains keys that are removed.
     *   If the message contains %s that is replaced by a list of removed keys.
     *
     * @return bool
     *   TRUE if the parameter bag has been sanitized, FALSE if not.
     */
    protected static function processParameterBag(ParameterBag $bag, array $safe_keys, $log_sanitized_keys, $bag_name, $message) {
        $sanitized = FALSE;
        $sanitized_keys = [];
        $bag->replace(static::stripDangerousValues($bag->all(), $safe_keys, $sanitized_keys));
        if (!empty($sanitized_keys)) {
            $sanitized = TRUE;
            if ($log_sanitized_keys) {
                trigger_error(sprintf($message, implode(', ', $sanitized_keys)));
            }
        }
        if ($bag->has('destination')) {
            $destination = $bag->get('destination');
            $destination_dangerous_keys = static::checkDestination($destination, $safe_keys);
            if (!empty($destination_dangerous_keys)) {
                // The destination is removed rather than sanitized because the URL
                // generator service is not available and this method is called very
                // early in the bootstrap.
                $bag->remove('destination');
                $sanitized = TRUE;
                if ($log_sanitized_keys) {
                    trigger_error(sprintf('Potentially unsafe destination removed from %s parameter bag because it contained the following keys: %s', $bag_name, implode(', ', $destination_dangerous_keys)));
                }
            }
            // Sanitize the destination parameter (which is often used for redirects)
            // to prevent open redirect attacks leading to other domains.
            if (UrlHelper::isExternal($destination)) {
                // The destination is removed because it is an external URL.
                $bag->remove('destination');
                $sanitized = TRUE;
                if ($log_sanitized_keys) {
                    trigger_error(sprintf('Potentially unsafe destination removed from %s parameter bag because it points to an external URL.', $bag_name));
                }
            }
        }
        return $sanitized;
    }
    
    /**
     * Checks a destination string to see if it is dangerous.
     *
     * @param string $destination
     *   The destination string to check.
     * @param string[] $safe_keys
     *   An array of keys to consider safe.
     *
     * @return array
     *   The dangerous keys found in the destination parameter.
     */
    protected static function checkDestination($destination, array $safe_keys) {
        $dangerous_keys = [];
        $parts = UrlHelper::parse($destination);
        // If there is a query string, check its query parameters.
        if (!empty($parts['query'])) {
            static::stripDangerousValues($parts['query'], $safe_keys, $dangerous_keys);
        }
        return $dangerous_keys;
    }
    
    /**
     * Strips dangerous keys from $input.
     *
     * @param mixed $input
     *   The input to sanitize.
     * @param string[] $safe_keys
     *   An array of keys to consider safe.
     * @param string[] $sanitized_keys
     *   An array of keys that have been removed.
     *
     * @return mixed
     *   The sanitized input.
     */
    protected static function stripDangerousValues($input, array $safe_keys, array &$sanitized_keys) {
        if (is_array($input)) {
            foreach ($input as $key => $value) {
                if ($key !== '' && ((string) $key)[0] === '#' && !in_array($key, $safe_keys, TRUE)) {
                    unset($input[$key]);
                    $sanitized_keys[] = $key;
                }
                else {
                    $input[$key] = static::stripDangerousValues($input[$key], $safe_keys, $sanitized_keys);
                }
            }
        }
        return $input;
    }

}

Members

Title Sort descending Deprecated Modifiers Object type Summary
RequestSanitizer::checkDestination protected static function Checks a destination string to see if it is dangerous.
RequestSanitizer::processParameterBag protected static function Processes a request parameter bag.
RequestSanitizer::sanitize public static function Strips dangerous keys from user input.
RequestSanitizer::SANITIZED constant Request attribute to mark the request as sanitized.
RequestSanitizer::SANITIZE_INPUT_SAFE_KEYS constant The name of the setting that configures the sanitize input safe keys.
RequestSanitizer::SANITIZE_LOG constant The name of the setting that determines if sanitized keys are logged.
RequestSanitizer::SANITIZE_WHITELIST Deprecated constant Previous name of SANITIZE_INPUT_SAFE_KEYS.
RequestSanitizer::stripDangerousValues protected static function Strips dangerous keys from $input.

Buggy or inaccurate documentation? Please file an issue. Need support? Need help programming? Connect with the Drupal community.