blob: 0cb1d0cb1bac5e8426078d038583bef21fba515f [file] [log] [blame]
Derek Jones9898b892010-03-10 14:04:17 -06001<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
2<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
3<head>
4
5<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
6<title>Security Class : CodeIgniter User Guide</title>
7
8<style type='text/css' media='all'>@import url('../userguide.css');</style>
9<link rel='stylesheet' type='text/css' media='all' href='../userguide.css' />
10
11<script type="text/javascript" src="../nav/nav.js"></script>
12<script type="text/javascript" src="../nav/prototype.lite.js"></script>
13<script type="text/javascript" src="../nav/moo.fx.js"></script>
14<script type="text/javascript" src="../nav/user_guide_menu.js"></script>
15
16<meta http-equiv='expires' content='-1' />
17<meta http-equiv= 'pragma' content='no-cache' />
18<meta name='robots' content='all' />
19<meta name='author' content='ExpressionEngine Dev Team' />
20<meta name='description' content='CodeIgniter User Guide' />
21
22</head>
23<body>
24
25<!-- START NAVIGATION -->
26<div id="nav"><div id="nav_inner"><script type="text/javascript">create_menu('../');</script></div></div>
27<div id="nav2"><a name="top"></a><a href="javascript:void(0);" onclick="myHeight.toggle();"><img src="../images/nav_toggle_darker.jpg" width="154" height="43" border="0" title="Toggle Table of Contents" alt="Toggle Table of Contents" /></a></div>
28<div id="masthead">
29<table cellpadding="0" cellspacing="0" border="0" style="width:100%">
30<tr>
Pascal Kriete1f622292011-04-07 12:06:51 -040031<td><h1>CodeIgniter User Guide Version 2.0.2</h1></td>
Derek Jones9898b892010-03-10 14:04:17 -060032<td id="breadcrumb_right"><a href="../toc.html">Table of Contents Page</a></td>
33</tr>
34</table>
35</div>
36<!-- END NAVIGATION -->
37
38
39<!-- START BREADCRUMB -->
40<table cellpadding="0" cellspacing="0" border="0" style="width:100%">
41<tr>
42<td id="breadcrumb">
43<a href="http://codeigniter.com/">CodeIgniter Home</a> &nbsp;&#8250;&nbsp;
44<a href="../index.html">User Guide Home</a> &nbsp;&#8250;&nbsp;
45Security Class
46</td>
47<td id="searchbox"><form method="get" action="http://www.google.com/search"><input type="hidden" name="as_sitesearch" id="as_sitesearch" value="codeigniter.com/user_guide/" />Search User Guide&nbsp; <input type="text" class="input" style="width:200px;" name="q" id="q" size="31" maxlength="255" value="" />&nbsp;<input type="submit" class="submit" name="sa" value="Go" /></form></td>
48</tr>
49</table>
50<!-- END BREADCRUMB -->
51
52<br clear="all" />
53
54
55<!-- START CONTENT -->
56<div id="content">
57
58
59<h1>Security Class</h1>
60
61<p>The Security Class contains methods that help you create a secure application, processing input data for security.</p>
62
63<h2>XSS Filtering</h2>
64
65<p>CodeIgniter comes with a Cross Site Scripting Hack prevention filter which can either run automatically to filter
Razican114ab092011-04-25 17:26:45 +020066all POST and COOKIE data that is encountered, or you can run it on a per item basis. By default it does <strong>not</strong>
Derek Jones9898b892010-03-10 14:04:17 -060067run globally since it requires a bit of processing overhead, and since you may not need it in all cases.</p>
68
69<p>The XSS filter looks for commonly used techniques to trigger Javascript or other types of code that attempt to hijack cookies
Razican114ab092011-04-25 17:26:45 +020070or do other malicious things. If anything disallowed is encountered it is rendered safe by converting the data to character entities.</p>
Derek Jones9898b892010-03-10 14:04:17 -060071
72<p>
73Note: This function should only be used to deal with data upon submission. It's not something that should be used for general runtime processing since it requires a fair amount of processing overhead.</p>
74
75
76<p>To filter data through the XSS filter use this function:</p>
77
78<h2>$this->security->xss_clean()</h2>
79
80<p>Here is an usage example:</p>
81
82<code>$data = $this->security->xss_clean($data);</code>
83
84<p>If you want the filter to run automatically every time it encounters POST or COOKIE data you can enable it by opening your
85<kbd>application/config/config.php</kbd> file and setting this:</p>
86
87<code>$config['global_xss_filtering'] = TRUE;</code>
88
89<p>Note: If you use the form validation class, it gives you the option of XSS filtering as well.</p>
90
Razican114ab092011-04-25 17:26:45 +020091<p>An optional second parameter, <dfn>is_image</dfn>, allows this function to be used to test images for potential XSS attacks, useful for file upload security. When this second parameter is set to <dfn>TRUE</dfn>, instead of returning an altered string, the function returns TRUE if the image is safe, and FALSE if it contained potentially malicious information that a browser may attempt to execute.</p>
Derek Jones9898b892010-03-10 14:04:17 -060092
93<code>if ($this->security->xss_clean($file, TRUE) === FALSE)<br />
94{<br />
95&nbsp;&nbsp;&nbsp;&nbsp;// file failed the XSS test<br />
96}</code>
97
98
99<h2>$this->security->sanitize_filename()</h2>
100
Razican114ab092011-04-25 17:26:45 +0200101<p>When accepting filenames from user input, it is best to sanitize them to prevent directory traversal and other security related issues. To do so, use the <dfn>sanitize_filename()</dfn> method of the Security class. Here is an example:</p>
Derek Jones9898b892010-03-10 14:04:17 -0600102
103<code>$filename = $this->security->sanitize_filename($this->input->post('filename'));</code>
104
Derek Jones2ef37592010-10-06 17:51:59 -0500105<p>If it is acceptable for the user input to include relative paths, e.g. <kbd>file/in/some/approved/folder.txt</kbd>, you can set the second optional parameter,
106 <samp>$relative_path</samp> to TRUE.</p>
Eric Barnes1c97d562011-01-28 13:34:50 -0500107
Derek Jones2ef37592010-10-06 17:51:59 -0500108<code>$filename = $this->security->sanitize_filename($this->input->post('filename'), TRUE);</code>
109
Derek Jones9898b892010-03-10 14:04:17 -0600110<!-- @todo write docs for CSRF methods -->
111
Eric Barnes1c97d562011-01-28 13:34:50 -0500112<h2>Cross-site request forgery (CSRF)</h2>
113
114<p>You can enable csrf protection by opening your <kbd>application/config/config.php</kbd> file and setting this:</p>
115<code>$config['csrf_protection'] = TRUE;</code>
116
117<p>If you use the <a href="../helpers/form_helper.html">form helper</a> the <var>form_open()</var> function will automatically insert a hidden csrf field in your forms.</p>
118
Derek Jones9898b892010-03-10 14:04:17 -0600119</div>
120<!-- END CONTENT -->
121
122
123<div id="footer">
124<p>
125Previous Topic:&nbsp;&nbsp;<a href="pagination.html">Pagination Class</a>
126&nbsp;&nbsp;&nbsp;&middot;&nbsp;&nbsp;
127<a href="#top">Top of Page</a>&nbsp;&nbsp;&nbsp;&middot;&nbsp;&nbsp;
128<a href="../index.html">User Guide Home</a>&nbsp;&nbsp;&nbsp;&middot;&nbsp;&nbsp;
129Next Topic:&nbsp;&nbsp;<a href="sessions.html">Session Class</a>
130</p>
Derek Jones700205a2011-01-28 07:44:28 -0600131<p><a href="http://codeigniter.com">CodeIgniter</a> &nbsp;&middot;&nbsp; Copyright &#169; 2006 - 2011 &nbsp;&middot;&nbsp; <a href="http://ellislab.com/">EllisLab, Inc.</a></p>
Derek Jones9898b892010-03-10 14:04:17 -0600132</div>
133
134</body>
135</html>