Templates XSS security
Security measures against XSS attacks
To prevent XSS issues Magento recommends the following rules for escaping output in templates:
-
If a method indicates that the content is escaped, do not escape:
getTitleHtml()
,getHtmlTitle()
(the title is ready for the HTML output) -
Type casting and php function
count()
don’t need escaping (for exampleecho (int)$var
,echo (bool)$var
,echo count($var)
) -
Output in single quotes doesn’t need escaping (for example
echo 'some text'
) -
Output in double quotes without variables doesn’t need escaping (for example
echo "some text"
) -
For all other cases, escape the data using specific escape functions.
The following code sample illustrates the XSS-safe output in templates:
Escape functions for templates
For the following output cases, use the specified function to generate XSS-safe output.
Case: JSON output
Function: No function needed for JSON output.
Case: String output that should not contain HTML
Function: escapeHtml
You can pass in an optional array of allowed tags that will not be escaped.
If a tag is allowed, the following attributes will not be escaped: id
, class
, href
, target
, style
and title
.
Any other attribute for that allowed tag will be escaped.
embed
, iframe
, video
, source
, object
, audion
, script
and img
tags will not be allowed regardless of the content of this array.
If your text contains special characters, they must be encoded as HTML entities, such as <
for < or >
for >.
Case: URL output
Function: escapeUrl
Case: Strings inside JavaScript
Function: In a JavaScript context, use the escapeJs
function.
In cases where the JavaScript code outputs content onto the page, use the escapeUrl
or the escapeHtml
function where appropriate.
For example, when a URL output string is inside a JavaScript context, use both escapeJs
and escapeUrl
. If you insert the output string from inside a JavaScript context into the DOM, use both escapeJs
and escapeHtml
.
Case: Strings inside HTML attributes
Function: escapeHtmlAttr
Static Test
To check your template for XSS vulnerabilities, you can use the static test XssPhtmlTemplateTest.php
in dev\tests\static\testsuite\Magento\Test\Php\
.
This static test finds all echo calls in PHTML-templates and determines if the output is properly escaped.
It covers the following cases:
-
/* @noEscape */
before output. Output doesn’t require escaping. Test is green. -
Methods which contain
"html"
in their names (for exampleecho $object->{suffix}Html{postfix}()
). Data is ready for the HTML output. Test is green. -
AbstractBlock methods
escapeHtml
,escapeHtmlAttr
,escapeUrl
,escapeJs
are allowed. Test is green. -
Type casting and php function
count()
are allowed (for exampleecho (int)$var
,(bool)$var
,count($var)
). Test is green. -
Output in single quotes (for example
echo 'some text'
). Test is green. -
Output in double quotes without variables (for example
echo "some text"
). Test is green. -
Other of previously mentioned. Output is not escaped. Test is red.