X-Git-Url: https://scripts.mit.edu/gitweb/autoinstalls/wordpress.git/blobdiff_plain/58f607a1de715c9bca69340a4d6fb9e1b9c2bed2..bf5c68485ef07868ad0a91168ecd0092af7661ae:/wp-includes/kses.php diff --git a/wp-includes/kses.php b/wp-includes/kses.php index 4a0a6790..c54029ca 100644 --- a/wp-includes/kses.php +++ b/wp-includes/kses.php @@ -1,26 +1,34 @@ + * @author Ulf Harnhammar * * @package External * @subpackage KSES * - * @internal - * *** CONTACT INFORMATION *** - * E-mail: metaur at users dot sourceforge dot net - * Web page: http://sourceforge.net/projects/kses - * Paper mail: Ulf Harnhammar - * Ymergatan 17 C - * 753 25 Uppsala - * SWEDEN - * - * [kses strips evil scripts!] */ /** @@ -492,7 +500,8 @@ if ( ! CUSTOM_TAGS ) { * @return string Filtered content with only allowed HTML elements */ function wp_kses($string, $allowed_html, $allowed_protocols = array ()) { - $allowed_protocols = wp_parse_args( $allowed_protocols, apply_filters('kses_allowed_protocols', array ('http', 'https', 'ftp', 'ftps', 'mailto', 'news', 'irc', 'gopher', 'nntp', 'feed', 'telnet', 'mms', 'rtsp', 'svn') )); + if ( empty( $allowed_protocols ) ) + $allowed_protocols = wp_allowed_protocols(); $string = wp_kses_no_null($string); $string = wp_kses_js_entities($string); $string = wp_kses_normalize_entities($string); @@ -505,7 +514,7 @@ function wp_kses($string, $allowed_html, $allowed_protocols = array ()) { * You add any kses hooks here. * * There is currently only one kses WordPress hook and it is called here. All - * parameters are passed to the hooks and expected to recieve a string. + * parameters are passed to the hooks and expected to receive a string. * * @since 1.0.0 * @@ -546,8 +555,18 @@ function wp_kses_split($string, $allowed_html, $allowed_protocols) { global $pass_allowed_html, $pass_allowed_protocols; $pass_allowed_html = $allowed_html; $pass_allowed_protocols = $allowed_protocols; - return preg_replace_callback('%((|$))|(<[^>]*(>|$)|>))%', - create_function('$match', 'global $pass_allowed_html, $pass_allowed_protocols; return wp_kses_split2($match[1], $pass_allowed_html, $pass_allowed_protocols);'), $string); + return preg_replace_callback( '%(|$))|(<[^>]*(>|$)|>)%', '_wp_kses_split_callback', $string ); +} + +/** + * Callback for wp_kses_split. + * + * @since 3.1.0 + * @access private + */ +function _wp_kses_split_callback( $match ) { + global $pass_allowed_html, $pass_allowed_protocols; + return wp_kses_split2( $match[0], $pass_allowed_html, $pass_allowed_protocols ); } /** @@ -578,9 +597,9 @@ function wp_kses_split2($string, $allowed_html, $allowed_protocols) { return '>'; # It matched a ">" character - if (preg_match('%^)?$%', $string, $matches)) { - $string = str_replace(array(''), '', $matches[1]); - while ( $string != $newstring = wp_kses($string, $allowed_html, $allowed_protocols) ) + if ( ''), '', $string ); + while ( $string != ($newstring = wp_kses($string, $allowed_html, $allowed_protocols)) ) $string = $newstring; if ( $string == '' ) return ''; @@ -600,15 +619,15 @@ function wp_kses_split2($string, $allowed_html, $allowed_protocols) { $elem = $matches[2]; $attrlist = $matches[3]; - if (!@isset($allowed_html[strtolower($elem)])) + if ( ! isset($allowed_html[strtolower($elem)]) ) return ''; # They are using a not allowed HTML element if ($slash != '') - return "<$slash$elem>"; + return ""; # No attributes are allowed for closing elements - return wp_kses_attr("$slash$elem", $attrlist, $allowed_html, $allowed_protocols); + return wp_kses_attr( $elem, $attrlist, $allowed_html, $allowed_protocols ); } /** @@ -636,50 +655,47 @@ function wp_kses_attr($element, $attr, $allowed_html, $allowed_protocols) { $xhtml_slash = ' /'; # Are any attributes allowed at all for this element? - - if (@ count($allowed_html[strtolower($element)]) == 0) + if ( ! isset($allowed_html[strtolower($element)]) || count($allowed_html[strtolower($element)]) == 0 ) return "<$element$xhtml_slash>"; # Split it - $attrarr = wp_kses_hair($attr, $allowed_protocols); # Go through $attrarr, and save the allowed attributes for this element # in $attr2 - $attr2 = ''; + $allowed_attr = $allowed_html[strtolower($element)]; foreach ($attrarr as $arreach) { - if (!@ isset ($allowed_html[strtolower($element)][strtolower($arreach['name'])])) + if ( ! isset( $allowed_attr[strtolower($arreach['name'])] ) ) continue; # the attribute is not allowed - $current = $allowed_html[strtolower($element)][strtolower($arreach['name'])]; - if ($current == '') + $current = $allowed_attr[strtolower($arreach['name'])]; + if ( $current == '' ) continue; # the attribute is not allowed - if (!is_array($current)) + if ( ! is_array($current) ) { $attr2 .= ' '.$arreach['whole']; # there are no checks - else { + } else { # there are some checks $ok = true; - foreach ($current as $currkey => $currval) - if (!wp_kses_check_attr_val($arreach['value'], $arreach['vless'], $currkey, $currval)) { + foreach ($current as $currkey => $currval) { + if ( ! wp_kses_check_attr_val($arreach['value'], $arreach['vless'], $currkey, $currval) ) { $ok = false; break; } + } - if ( $arreach['name'] == 'style' ) { + if ( strtolower($arreach['name']) == 'style' ) { $orig_value = $arreach['value']; - $value = safecss_filter_attr($orig_value); if ( empty($value) ) continue; $arreach['value'] = $value; - $arreach['whole'] = str_replace($orig_value, $value, $arreach['whole']); } @@ -689,7 +705,6 @@ function wp_kses_attr($element, $attr, $allowed_html, $allowed_protocols) { } # foreach # Remove any "<" or ">" characters - $attr2 = preg_replace('/[<>]/', '', $attr2); return "<$element$attr2$xhtml_slash>"; @@ -762,7 +777,7 @@ function wp_kses_hair($attr, $allowed_protocols) { # "value" { $thisval = $match[1]; - if ( in_array($attrname, $uris) ) + if ( in_array(strtolower($attrname), $uris) ) $thisval = wp_kses_bad_protocol($thisval, $allowed_protocols); if(FALSE === array_key_exists($attrname, $attrarr)) { @@ -778,7 +793,7 @@ function wp_kses_hair($attr, $allowed_protocols) { # 'value' { $thisval = $match[1]; - if ( in_array($attrname, $uris) ) + if ( in_array(strtolower($attrname), $uris) ) $thisval = wp_kses_bad_protocol($thisval, $allowed_protocols); if(FALSE === array_key_exists($attrname, $attrarr)) { @@ -794,7 +809,7 @@ function wp_kses_hair($attr, $allowed_protocols) { # value { $thisval = $match[1]; - if ( in_array($attrname, $uris) ) + if ( in_array(strtolower($attrname), $uris) ) $thisval = wp_kses_bad_protocol($thisval, $allowed_protocols); if(FALSE === array_key_exists($attrname, $attrarr)) { @@ -828,7 +843,7 @@ function wp_kses_hair($attr, $allowed_protocols) { * Performs different checks for attribute values. * * The currently implemented checks are "maxlen", "minlen", "maxval", "minval" - * and "valueless" with even more checks to come soon. + * and "valueless". * * @since 1.0.0 * @@ -873,7 +888,7 @@ function wp_kses_check_attr_val($value, $vless, $checkname, $checkvalue) { break; case 'minval' : - # The minval check checks that the attribute value is a positive integer, + # The minval check makes sure that the attribute value is a positive integer, # and that it is not smaller than the given value. if (!preg_match('/^\s{0,6}[0-9]{1,6}\s{0,6}$/', $value)) @@ -883,7 +898,7 @@ function wp_kses_check_attr_val($value, $vless, $checkname, $checkvalue) { break; case 'valueless' : - # The valueless check checks if the attribute has a value + # The valueless check makes sure if the attribute has a value # (like ) or not (