t3g / svg-sanitize-elts7
An SVG sanitizer for PHP
Requires
- php: ^5.5 || ^7.0
- ext-dom: *
- ext-libxml: *
Requires (Dev)
- phpunit/phpunit: ^4.8 || ^6.5
Replaces
- enshrined/svg-sanitize: 0.15.4.1
- dev-master
- 0.15.4.1
- 0.15.4
- 0.15.3
- 0.15.2
- 0.15.1
- 0.15.0
- 0.14.1
- 0.14.0
- 0.13.3
- 0.13.2
- 0.13.1
- 0.13.0
- 0.12.0
- 0.11.0
- 0.10.0
- 0.9.2
- 0.9.1
- 0.9.0
- 0.8.2
- 0.8.1
- 0.8.0
- 0.7.2
- 0.7.1
- 0.7.0
- 0.6.0
- 0.5.3.1
- 0.5.3
- 0.5.2
- 0.5.1
- 0.5.0
- 0.4.1
- 0.4.0
- 0.3.0
- 0.2.1
- 0.2.0
- 0.1.6
- 0.1.5
- 0.1.4
- 0.1.3
- 0.1.2
- 0.1.1
- 0.1.0
- dev-task/php55
- dev-fix/case-sensitive-attrs
- dev-feature/update-codeclimate-id
- dev-feature/fix-tests
- dev-develop
- dev-fix/31-xss
This package is auto-updated.
Last update: 2022-12-23 10:40:40 UTC
README
⚠️ This is an interim package for TYPO3 CMS 7.6 ELTS only, providing changes to be compatible with PHP 5.5! As soon support for TYPO3 CMS 7.6 ETLS is dropped, this package will be abandoned as well. Using this package in any other scope is not and will not be supported.
Installation
Either require t3g/svg-sanitize-elts7
through composer or download the repo and include the old way!
Usage
Using this is fairly easy. Create a new instance of enshrined\svgSanitize\Sanitizer
and then call the sanitize
whilst passing in your dirty SVG/XML
Basic Example
use enshrined\svgSanitize\Sanitizer; // Create a new sanitizer instance $sanitizer = new Sanitizer(); // Load the dirty svg $dirtySVG = file_get_contents('filthy.svg'); // Pass it to the sanitizer and get it back clean $cleanSVG = $sanitizer->sanitize($dirtySVG); // Now do what you want with your clean SVG/XML data
Output
This will either return a sanitized SVG/XML string or boolean false
if XML parsing failed (usually due to a badly formatted file).
Options
You may pass your own whitelist of tags and attributes by using the Sanitizer::setAllowedTags
and Sanitizer::setAllowedAttrs
methods respectively.
These methods require that you implement the enshrined\svgSanitize\data\TagInterface
or enshrined\svgSanitize\data\AttributeInterface
.
Remove remote references
You have the option to remove attributes that reference remote files, this will stop HTTP leaks but will add an overhead to the sanitizer.
This defaults to false, set to true to remove references.
$sanitizer->removeRemoteReferences(true);
Viewing Sanitization Issues
You may use the getXmlIssues()
method to return an array of issues that occurred during sanitization.
This may be useful for logging or providing feedback to the user on why an SVG was refused.
$issues = $sanitizer->getXmlIssues();
Minification
You can minify the XML output by calling $sanitizer->minify(true);
.
Demo
There is a demo available at: http://svg.enshrined.co.uk/
WordPress
I've just released a WordPress plugin containing this code so you can sanitize your WordPress uploads. It's available from the WordPress plugin directory: https://wordpress.org/plugins/safe-svg/
Drupal
Michael Potter has kindly created a Drupal module for this library which is available at: https://www.drupal.org/project/svg_sanitizer
TYPO3
An integration for TYPO3 CMS of this library is available as composer package t3g/svg-sanitizer
at https://github.com/TYPO3GmbH/svg_sanitizer
Tests
You can run these by running vendor/bin/phpunit
from the base directory of this package.
Standalone scanning of files via CLI
Thanks to the work by gudmdharalds there's now a standalone scanner that can be used via the CLI.
Any errors will be output in JSON format. See the PR for an example.
Use it as follows: php svg-scanner.php ~/svgs/myfile.svg
To-Do
More extensive testing for the SVGs/XML would be lovely, I'll try and add these soon. If you feel like doing it for me, please do and make a PR!