XSS prevention strategies
Cross-site scripting, or XSS, is a security vulnerability that can be found in web applications. This vulnerability allows attackers to inject malicious code into a web page viewed by users. Magento extension developers should be aware of these vulnerabilities to avoid introducing them in their code.
There are mainly three types of XSS vulnerabilities:
- Persisted XSS - In this type of vulnerability, the source of unvalidated data comes from the Database or Backend permanent store.
- Reflected (non-persistent) XSS - This type of vulnerability occurs when data provided by a web client is used immediately by server-side scripts to parse and display a page to a user without properly sanitizing the request.
XSS vulnerabilities can be prevented by always validating and sanitizing both user input and output, i.e., user input should never be trusted. Both the PHP language and Magento provides classes and functions to help secure your extension from XSS vulnerabilities.
Any data you receive from an external source needs to be validated and sanitized to prevent the storage or execution of malicious code. Input data needs to be validated such that it is within the accepted possible values for that data item. This can vary depending on what that data is used for, but certain field validations can be applied almost universally such as checking for control characters.
Output processing involves sanitizing strings that may have come from external data sources before sending it to the browser to be rendered with templates. It is the main method of protecting your extension from XSS attacks.
For more information, see the article on templates XSS security.
Using the Escaper classes
||Escapes string inside HTML content|
||Escapes strings in HTML tag attributes|
||Used for escaping strings inside a CSS context.|
||Escapes quotes inside HTML attributes|
||Used for escaping strings that will be used in a URL.|
||Escapes XSS in URLs|