dmk / mksanitizedparameters
Sanitize $_REQUEST, $_POST and $_GET before the processing of TYPO3 in backend or frontend starts. Take a look into the documentation how to add your own rules or see which one exist.
Installs: 26 395
Dependents: 1
Suggesters: 2
Security: 0
Stars: 2
Watchers: 28
Forks: 2
Open Issues: 0
Type:typo3-cms-extension
Requires
- php: ^7.4 || ^8.0
- typo3/cms-core: ^11.5.7 || ^12.4.7
Requires (Dev)
- friendsofphp/php-cs-fixer: ^3.3
- php-parallel-lint/php-parallel-lint: ^1.3
- phpcompatibility/php-compatibility: ^9.3.5
- phpmd/phpmd: ^2.14
- phpspec/prophecy-phpunit: ^2.0.1
- phpstan/extension-installer: ^1.3
- phpstan/phpstan: ^1.1
- saschaegerer/phpstan-typo3: ^1.9
- typo3/testing-framework: ^6.0 || ^7.0
Replaces
- typo3-ter/mksanitizedparameters: v12.0.3
- 12.4.x-dev
- v12.0.3
- v12.0.2
- v12.0.1
- v12.0.0
- 11.5.x-dev
- v11.0.8
- v11.0.7
- v11.0.6
- v11.0.5
- v11.0.4
- v11.0.3
- v11.0.2
- v11.0.1
- v11.0.0
- 10.4.x-dev
- v10.0.3
- v10.0.2
- 10.0.1
- 10.0.0
- 9.5.x-dev
- 9.5.2
- 9.5.1
- 9.5.0
- 3.0.5
- 3.0.4
- 3.0.3
- 3.0.2
- 3.0.1
- 3.0.0
- 2.0.4
- 2.0.3
- 2.0.2
- 2.0.1
- 2.0.0
- 1.1.1
- 1.1.0
- 1.0.5
- 1.0.4
- 1.0.3
- dev-legacy-3.0
This package is auto-updated.
Last update: 2024-12-06 09:07:38 UTC
README
What does it do?
Sanitizes all parameters in $_GET
, $_POST
and ServerRequestInterface $request
for frontend and backend.
Every possible parameter can be configured separately.
The configuration can be for a specific position in the parameter array
or common for every possible position or even default for all parameters, which are not configured.
This way possible attacks like MySQL injections can be prevented even for parameters where attack potential was not suspected. So unclosed security holes are harder or even not at all exploited.
Taking care of the correct data type of a parameter is now done in one single place. You don't need to call intval() for numeric parameters every time you use them (e.g. in a MySQL query). You can use them safe and directly without any further action at any place you want. You just have to provide the correct rule/configuration to be sure your code is not vulnerable to MySQL injections etc.
The sanitizing itself is done through the filter function of PHP. So you can take full advantage of it's features and provide even custom filters.
Features
The extension has 3 modes which can be configured through extension configuration:
- stealth mode: simulate the sanitizing and log all theoretical actions. you also need to set a page id where the logs are written to.
- log mode: every parameter which is sanitized (has changed) will be logged at warn level. This way you can investigate what happened. Either it was an attack attempt or the rules have to be adjusted.
- debug mode: useful during development. every parameter which is sanitized (has changed) will be reported on the screen through a debug message.
Rules
Own rules for sanitizing a parameter can be registered easily. see rules