blob: 05553142fab4c61fb23a4661bbc6dee17eee5c76 [file] [log] [blame]
Derek Jones8ede1a22011-10-05 13:34:52 -05001##############
2Security Class
3##############
4
5The Security Class contains methods that help you create a secure
6application, processing input data for security.
7
8XSS Filtering
9=============
10
11CodeIgniter comes with a Cross Site Scripting Hack prevention filter
12which can either run automatically to filter all POST and COOKIE data
13that is encountered, or you can run it on a per item basis. By default
14it does **not** run globally since it requires a bit of processing
15overhead, and since you may not need it in all cases.
16
17The XSS filter looks for commonly used techniques to trigger Javascript
18or other types of code that attempt to hijack cookies or do other
19malicious things. If anything disallowed is encountered it is rendered
20safe by converting the data to character entities.
21
22Note: This function should only be used to deal with data upon
23submission. It's not something that should be used for general runtime
24processing since it requires a fair amount of processing overhead.
25
26To filter data through the XSS filter use this function:
27
28$this->security->xss_clean()
Andrey Andreevf795ab52012-10-24 21:28:25 +030029============================
Derek Jones8ede1a22011-10-05 13:34:52 -050030
31Here is an usage example::
32
33 $data = $this->security->xss_clean($data);
34
35If you want the filter to run automatically every time it encounters
36POST or COOKIE data you can enable it by opening your
37application/config/config.php file and setting this::
38
39 $config['global_xss_filtering'] = TRUE;
40
41Note: If you use the form validation class, it gives you the option of
42XSS filtering as well.
43
44An optional second parameter, is_image, allows this function to be used
45to test images for potential XSS attacks, useful for file upload
46security. When this second parameter is set to TRUE, instead of
47returning an altered string, the function returns TRUE if the image is
48safe, and FALSE if it contained potentially malicious information that a
49browser may attempt to execute.
50
51::
52
Derek Joneseb946d02011-10-05 15:47:43 -050053 if ($this->security->xss_clean($file, TRUE) === FALSE)
54 {
55 // file failed the XSS test
56 }
Derek Jones8ede1a22011-10-05 13:34:52 -050057
58$this->security->sanitize_filename()
Andrey Andreevf795ab52012-10-24 21:28:25 +030059====================================
Derek Jones8ede1a22011-10-05 13:34:52 -050060
61When accepting filenames from user input, it is best to sanitize them to
62prevent directory traversal and other security related issues. To do so,
63use the sanitize_filename() method of the Security class. Here is an
64example::
65
66 $filename = $this->security->sanitize_filename($this->input->post('filename'));
67
68If it is acceptable for the user input to include relative paths, e.g.
69file/in/some/approved/folder.txt, you can set the second optional
70parameter, $relative_path to TRUE.
71
72::
73
74 $filename = $this->security->sanitize_filename($this->input->post('filename'), TRUE);
75
76Cross-site request forgery (CSRF)
77=================================
78
Andrey Andreevf795ab52012-10-24 21:28:25 +030079You can enable CSRF protection by opening your
Derek Jones8ede1a22011-10-05 13:34:52 -050080application/config/config.php file and setting this::
81
82 $config['csrf_protection'] = TRUE;
83
Andrey Andreevf795ab52012-10-24 21:28:25 +030084If you use the :doc:`form helper <../helpers/form_helper>`, then
85``form_open()`` will automatically insert a hidden csrf field in
86your forms. If not, then you can use ``csrf_get_token_name()``
87and ``csrf_get_hash()``
Derek Jones8ede1a22011-10-05 13:34:52 -050088
Andrey Andreevf795ab52012-10-24 21:28:25 +030089::
90
91 $csrf = array(
92 'name' => $this->security->csrf_get_token_name(),
93 'hash' => $this->security->csrf_get_hash()
94 );
95
96 ...
97
98 <input type="hidden" name="<?=$csrf['name'];?>" value="<?=$csrf['hash'];?>" />
99
100Tokens may be either regenerated on every submission (default) or
101kept the same throughout the life of the CSRF cookie. The default
102regeneration of tokens provides stricter security, but may result
103in usability concerns as other tokens become invalid (back/forward
104navigation, multiple tabs/windows, asynchronous actions, etc). You
105may alter this behavior by editing the following config parameter
106
107::
RS7123ea93b2012-01-03 12:43:16 -0200108
109 $config['csrf_regeneration'] = TRUE;
110
Derek Jones8ede1a22011-10-05 13:34:52 -0500111Select URIs can be whitelisted from csrf protection (for example API
112endpoints expecting externally POSTed content). You can add these URIs
113by editing the 'csrf_exclude_uris' config parameter::
114
115 $config['csrf_exclude_uris'] = array('api/person/add');
116
Andrey Andreevf795ab52012-10-24 21:28:25 +0300117$this->security->get_csrf_token_name()
118======================================
119
120Returns the CSRF token name, which is set by
121``$config['csrf_token_name']``.
122
123$this->security->get_csrf_hash()
124================================
125
126Returns the CSRF hash value. Useful in combination with
127``get_csrf_token_name()`` for manually building forms or
128sending valid AJAX POST requests.