mirror of
https://github.com/apache/skywalking-booster-ui.git
synced 2026-04-20 12:05:29 +00:00
fix: verify URL when viewing dashboards (#483)
This commit is contained in:
64
src/utils/validateAndSanitizeUrl.ts
Normal file
64
src/utils/validateAndSanitizeUrl.ts
Normal file
@@ -0,0 +1,64 @@
|
||||
/**
|
||||
* Licensed to the Apache Software Foundation (ASF) under one or more
|
||||
* contributor license agreements. See the NOTICE file distributed with
|
||||
* this work for additional information regarding copyright ownership.
|
||||
* The ASF licenses this file to You under the Apache License, Version 2.0
|
||||
* (the "License"); you may not use this file except in compliance with
|
||||
* the License. You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
// URL validation function to prevent XSS
|
||||
export function validateAndSanitizeUrl(inputUrl: string): { isValid: boolean; sanitizedUrl: string; error: string } {
|
||||
if (!inputUrl.trim()) {
|
||||
return { isValid: true, sanitizedUrl: "", error: "" };
|
||||
}
|
||||
|
||||
try {
|
||||
// Create URL object to validate the URL format
|
||||
const urlObj = new URL(inputUrl);
|
||||
|
||||
// Only allow HTTP and HTTPS protocols to prevent XSS
|
||||
if (!["http:", "https:"].includes(urlObj.protocol)) {
|
||||
return {
|
||||
isValid: false,
|
||||
sanitizedUrl: "",
|
||||
error: "Only HTTP and HTTPS URLs are allowed",
|
||||
};
|
||||
}
|
||||
|
||||
// Additional security checks
|
||||
const dangerousProtocols = ["javascript:", "data:", "vbscript:", "le:"];
|
||||
const lowerUrl = inputUrl.toLowerCase();
|
||||
|
||||
for (const protocol of dangerousProtocols) {
|
||||
if (lowerUrl.includes(protocol)) {
|
||||
return {
|
||||
isValid: false,
|
||||
sanitizedUrl: "",
|
||||
error: "Dangerous protocols are not allowed",
|
||||
};
|
||||
}
|
||||
}
|
||||
|
||||
// Return the sanitized URL (using the URL object to normalize it)
|
||||
return {
|
||||
isValid: true,
|
||||
sanitizedUrl: urlObj.href,
|
||||
error: "",
|
||||
};
|
||||
} catch (error) {
|
||||
return {
|
||||
isValid: false,
|
||||
sanitizedUrl: "",
|
||||
error: "Please enter a valid URL",
|
||||
};
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user