inputSanitizer.js 3.2 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374
  1. import DOMPurify from 'dompurify';
  2. // Server-side input sanitization to prevent CSS injection and XSS attacks
  3. export function sanitizeInput(input) {
  4. if (typeof input !== 'string') {
  5. return input;
  6. }
  7. // Remove any HTML tags and dangerous content
  8. const sanitized = DOMPurify.sanitize(input, {
  9. ALLOWED_TAGS: [],
  10. ALLOWED_ATTR: [],
  11. KEEP_CONTENT: true,
  12. FORBID_TAGS: ['style', 'script', 'link', 'meta', 'iframe', 'object', 'embed', 'applet', 'form', 'input', 'textarea', 'select', 'option', 'button', 'label', 'fieldset', 'legend', 'frameset', 'frame', 'noframes', 'base', 'basefont', 'isindex', 'dir', 'menu', 'menuitem', 'svg', 'defs', 'use', 'g', 'symbol', 'marker', 'pattern', 'mask', 'clipPath', 'linearGradient', 'radialGradient', 'stop', 'animate', 'animateTransform', 'animateMotion', 'set', 'switch', 'foreignObject'],
  13. FORBID_ATTR: ['style', 'class', 'id', 'onload', 'onerror', 'onclick', 'onmouseover', 'onfocus', 'onblur', 'onchange', 'onsubmit', 'onreset', 'onselect', 'onunload', 'onresize', 'onscroll', 'onkeydown', 'onkeyup', 'onkeypress', 'onmousedown', 'onmouseup', 'onmouseover', 'onmouseout', 'onmousemove', 'ondblclick', 'oncontextmenu', 'onwheel', 'ontouchstart', 'ontouchend', 'ontouchmove', 'ontouchcancel', 'onabort', 'oncanplay', 'oncanplaythrough', 'ondurationchange', 'onemptied', 'onended', 'onerror', 'onloadeddata', 'onloadedmetadata', 'onloadstart', 'onpause', 'onplay', 'onplaying', 'onprogress', 'onratechange', 'onseeked', 'onseeking', 'onstalled', 'onsuspend', 'ontimeupdate', 'onvolumechange', 'onwaiting', 'onbeforeunload', 'onhashchange', 'onpagehide', 'onpageshow', 'onpopstate', 'onstorage', 'onunload', 'xlink:href', 'href', 'data-*', 'aria-*'],
  14. ALLOW_UNKNOWN_PROTOCOLS: false,
  15. SANITIZE_DOM: true,
  16. KEEP_CONTENT: true,
  17. ADD_ATTR: [],
  18. ALLOW_DATA_ATTR: false
  19. });
  20. // Additional check for CSS injection patterns
  21. const cssInjectionPatterns = [
  22. /<style[^>]*>.*?<\/style>/gi,
  23. /style\s*=\s*["'][^"']*["']/gi,
  24. /@import\s+[^;]+;/gi,
  25. /url\s*\(\s*[^)]+\s*\)/gi,
  26. /expression\s*\(/gi,
  27. /javascript\s*:/gi,
  28. /vbscript\s*:/gi,
  29. /data\s*:/gi
  30. ];
  31. let cleaned = sanitized;
  32. for (const pattern of cssInjectionPatterns) {
  33. if (pattern.test(cleaned)) {
  34. if (process.env.DEBUG === 'true') {
  35. console.warn('Blocked potential CSS injection in input:', cleaned.substring(0, 100) + '...');
  36. }
  37. // Remove the dangerous content
  38. cleaned = cleaned.replace(pattern, '');
  39. }
  40. }
  41. return cleaned.trim();
  42. }
  43. // Specific function for sanitizing titles
  44. export function sanitizeTitle(title) {
  45. if (typeof title !== 'string') {
  46. return title;
  47. }
  48. // First sanitize the input
  49. let sanitized = sanitizeInput(title);
  50. // Additional title-specific sanitization
  51. // Remove any remaining HTML entities that might be dangerous
  52. sanitized = sanitized.replace(/&[#\w]+;/g, '');
  53. // Remove any remaining angle brackets
  54. sanitized = sanitized.replace(/[<>]/g, '');
  55. // Limit length to prevent abuse
  56. if (sanitized.length > 1000) {
  57. sanitized = sanitized.substring(0, 1000);
  58. if (process.env.DEBUG === 'true') {
  59. console.warn('Truncated long title input:', title.length, 'characters');
  60. }
  61. }
  62. return sanitized.trim();
  63. }