summaryrefslogtreecommitdiffstats
path: root/dom/base/nsTreeSanitizer.h
diff options
context:
space:
mode:
authorMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
committerMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
commit5f8de423f190bbb79a62f804151bc24824fa32d8 (patch)
tree10027f336435511475e392454359edea8e25895d /dom/base/nsTreeSanitizer.h
parent49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff)
downloadUXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip
Add m-esr52 at 52.6.0
Diffstat (limited to 'dom/base/nsTreeSanitizer.h')
-rw-r--r--dom/base/nsTreeSanitizer.h227
1 files changed, 227 insertions, 0 deletions
diff --git a/dom/base/nsTreeSanitizer.h b/dom/base/nsTreeSanitizer.h
new file mode 100644
index 000000000..b8700d775
--- /dev/null
+++ b/dom/base/nsTreeSanitizer.h
@@ -0,0 +1,227 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#ifndef nsTreeSanitizer_h_
+#define nsTreeSanitizer_h_
+
+#include "mozilla/css/StyleRule.h"
+#include "nsIPrincipal.h"
+#include "mozilla/dom/Element.h"
+
+class nsIContent;
+
+/**
+ * See the documentation of nsIParserUtils::sanitize for documentation
+ * about the default behavior and the configuration options of this sanitizer.
+ */
+class MOZ_STACK_CLASS nsTreeSanitizer {
+
+ public:
+
+ /**
+ * The constructor.
+ *
+ * @param aFlags Flags from nsIParserUtils
+ */
+ explicit nsTreeSanitizer(uint32_t aFlags = 0);
+
+ static void InitializeStatics();
+ static void ReleaseStatics();
+
+ /**
+ * Sanitizes a disconnected DOM fragment freshly obtained from a parser.
+ * The argument must be of type nsINode::eDOCUMENT_FRAGMENT and,
+ * consequently, must not be in the document. Furthermore, the fragment
+ * must have just come from a parser so that it can't have mutation
+ * event listeners set on it.
+ */
+ void Sanitize(nsIContent* aFragment);
+
+ /**
+ * Sanitizes a disconnected (not in a docshell) document freshly obtained
+ * from a parser. The document must not be embedded in a docshell and must
+ * not have had a chance to get mutation event listeners attached to it.
+ * The root element must be <html>.
+ */
+ void Sanitize(nsIDocument* aDocument);
+
+ private:
+
+ /**
+ * Whether <style> and style="" are allowed.
+ */
+ bool mAllowStyles;
+
+ /**
+ * Whether comment nodes are allowed.
+ */
+ bool mAllowComments;
+
+ /**
+ * Whether HTML <font>, <center>, bgcolor="", etc., are dropped.
+ */
+ bool mDropNonCSSPresentation;
+
+ /**
+ * Whether to remove forms and form controls (excluding fieldset/legend).
+ */
+ bool mDropForms;
+
+ /**
+ * Whether only cid: embeds are allowed.
+ */
+ bool mCidEmbedsOnly;
+
+ /**
+ * Whether to drop <img>, <video>, <audio> and <svg>.
+ */
+ bool mDropMedia;
+
+ /**
+ * Whether we are sanitizing a full document (as opposed to a fragment).
+ */
+ bool mFullDocument;
+
+ void SanitizeChildren(nsINode* aRoot);
+
+ /**
+ * Queries if an element must be replaced with its children.
+ * @param aNamespace the namespace of the element the question is about
+ * @param aLocal the local name of the element the question is about
+ * @return true if the element must be replaced with its children and
+ * false if the element is to be kept
+ */
+ bool MustFlatten(int32_t aNamespace, nsIAtom* aLocal);
+
+ /**
+ * Queries if an element including its children must be removed.
+ * @param aNamespace the namespace of the element the question is about
+ * @param aLocal the local name of the element the question is about
+ * @param aElement the element node itself for inspecting attributes
+ * @return true if the element and its children must be removed and
+ * false if the element is to be kept
+ */
+ bool MustPrune(int32_t aNamespace,
+ nsIAtom* aLocal,
+ mozilla::dom::Element* aElement);
+
+ /**
+ * Checks if a given local name (for an attribute) is on the given list
+ * of URL attribute names.
+ * @param aURLs the list of URL attribute names
+ * @param aLocalName the name to search on the list
+ * @return true if aLocalName is on the aURLs list and false otherwise
+ */
+ bool IsURL(nsIAtom*** aURLs, nsIAtom* aLocalName);
+
+ /**
+ * Removes dangerous attributes from the element. If the style attribute
+ * is allowed, its value is sanitized. The values of URL attributes are
+ * sanitized, except src isn't sanitized when it is allowed to remain
+ * potentially dangerous.
+ *
+ * @param aElement the element whose attributes should be sanitized
+ * @param aAllowed the whitelist of permitted local names to use
+ * @param aURLs the local names of URL-valued attributes
+ * @param aAllowXLink whether XLink attributes are allowed
+ * @param aAllowStyle whether the style attribute is allowed
+ * @param aAllowDangerousSrc whether to leave the value of the src
+ * attribute unsanitized
+ */
+ void SanitizeAttributes(mozilla::dom::Element* aElement,
+ nsTHashtable<nsISupportsHashKey>* aAllowed,
+ nsIAtom*** aURLs,
+ bool aAllowXLink,
+ bool aAllowStyle,
+ bool aAllowDangerousSrc);
+
+ /**
+ * Remove the named URL attribute from the element if the URL fails a
+ * security check.
+ *
+ * @param aElement the element whose attribute to possibly modify
+ * @param aNamespace the namespace of the URL attribute
+ * @param aLocalName the local name of the URL attribute
+ * @return true if the attribute was removed and false otherwise
+ */
+ bool SanitizeURL(mozilla::dom::Element* aElement,
+ int32_t aNamespace,
+ nsIAtom* aLocalName);
+
+ /**
+ * Checks a style rule for the presence of the 'binding' CSS property and
+ * removes that property from the rule and reserializes in case the
+ * property was found.
+ *
+ * @param aDeclaration The style declaration to check
+ * @param aRuleText the serialized mutated rule if the method returns true
+ * @return true if the rule was modified and false otherwise
+ */
+ bool SanitizeStyleDeclaration(mozilla::css::Declaration* aDeclaration,
+ nsAutoString& aRuleText);
+
+ /**
+ * Parses a style sheet and reserializes it with the 'binding' property
+ * removed if it was present.
+ *
+ * @param aOrigin the original style sheet source
+ * @param aSanitized the reserialization without 'binding'; only valid if
+ * this method return true
+ * @param aDocument the document the style sheet belongs to
+ * @param aBaseURI the base URI to use
+ * @return true if the 'binding' property was encountered and false
+ * otherwise
+ */
+ bool SanitizeStyleSheet(const nsAString& aOriginal,
+ nsAString& aSanitized,
+ nsIDocument* aDocument,
+ nsIURI* aBaseURI);
+
+ /**
+ * Removes all attributes from an element node.
+ */
+ void RemoveAllAttributes(nsIContent* aElement);
+
+ /**
+ * The whitelist of HTML elements.
+ */
+ static nsTHashtable<nsISupportsHashKey>* sElementsHTML;
+
+ /**
+ * The whitelist of non-presentational HTML attributes.
+ */
+ static nsTHashtable<nsISupportsHashKey>* sAttributesHTML;
+
+ /**
+ * The whitelist of presentational HTML attributes.
+ */
+ static nsTHashtable<nsISupportsHashKey>* sPresAttributesHTML;
+
+ /**
+ * The whitelist of SVG elements.
+ */
+ static nsTHashtable<nsISupportsHashKey>* sElementsSVG;
+
+ /**
+ * The whitelist of SVG attributes.
+ */
+ static nsTHashtable<nsISupportsHashKey>* sAttributesSVG;
+
+ /**
+ * The whitelist of SVG elements.
+ */
+ static nsTHashtable<nsISupportsHashKey>* sElementsMathML;
+
+ /**
+ * The whitelist of MathML attributes.
+ */
+ static nsTHashtable<nsISupportsHashKey>* sAttributesMathML;
+
+ /**
+ * Reusable null principal for URL checks.
+ */
+ static nsIPrincipal* sNullPrincipal;
+};
+
+#endif // nsTreeSanitizer_h_