/* Copyright 2009, 2012 predic8 GmbH, www.predic8.com Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package com.predic8.membrane.core.interceptor.xmlprotection; import java.io.ByteArrayOutputStream; import java.io.InputStreamReader; import java.io.OutputStreamWriter; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import com.predic8.membrane.annot.MCAttribute; import com.predic8.membrane.annot.MCElement; import com.predic8.membrane.core.Constants; import com.predic8.membrane.core.exchange.Exchange; import com.predic8.membrane.core.http.Response; import com.predic8.membrane.core.interceptor.AbstractInterceptor; import com.predic8.membrane.core.interceptor.Outcome; /** * @description Prohibits XML documents to be passed through that look like XML attacks on older parsers. Too many * attributes, too long element names are such indications. DTD definitions will simply be removed. * @topic 6. Security */ @MCElement(name="xmlProtection") public class XMLProtectionInterceptor extends AbstractInterceptor { private static Logger log = LoggerFactory.getLogger(XMLProtectionInterceptor.class.getName()); private int maxAttibuteCount = 1000; private int maxElementNameLength = 1000; private boolean removeDTD = true; public XMLProtectionInterceptor() { name = "XML Protection"; setFlow(Flow.Set.REQUEST); } @Override public Outcome handleRequest(Exchange exc) throws Exception { if (exc.getRequest().isBodyEmpty()) { log.info("body is empty -> request is not scanned by xmlProtection"); return Outcome.CONTINUE; } if (!exc.getRequest().isXML()) { log.warn("request discarded by xmlProtection, because it's Content-Type header did not indicate that it is actually XML."); return Outcome.ABORT; } if (!protectXML(exc)) { log.warn("request discarded by xmlProtection, because it is not wellformed or exceeds limits"); setFailResponse(exc); return Outcome.ABORT; } log.debug("protected against XML attacks"); return Outcome.CONTINUE; } private void setFailResponse(Exchange exc) { exc.setResponse(Response.badRequest("Invalid XML features used in request.").build()); } private boolean protectXML(Exchange exc) throws Exception { ByteArrayOutputStream stream = new ByteArrayOutputStream(); XMLProtector protector = new XMLProtector(new OutputStreamWriter(stream, getCharset(exc)), removeDTD, maxElementNameLength, maxAttibuteCount); if (!protector.protect(new InputStreamReader(exc.getRequest().getBodyAsStreamDecoded(), getCharset(exc) ))) return false; exc.getRequest().setBodyContent(stream.toByteArray()); return true; } /** * If no charset is specified, use standard XML charset UTF-8. */ private String getCharset(Exchange exc) { String charset = exc.getRequest().getCharset(); if (charset == null) return Constants.UTF_8; return charset; } /** * @description If an incoming request exceeds this limit, it will be discarded. * @default 1000 */ @MCAttribute public void setMaxAttibuteCount(int maxAttibuteCount) { this.maxAttibuteCount = maxAttibuteCount; } /** * @description If an incoming request exceeds this limit, it will be discarded. * @default 1000 */ @MCAttribute public void setMaxElementNameLength(int maxElementNameLength) { this.maxElementNameLength = maxElementNameLength; } /** * @description Whether to remove the DTD from incoming requests. * @default true */ @MCAttribute public void setRemoveDTD(boolean removeDTD) { this.removeDTD = removeDTD; } @Override public String getShortDescription() { return "Protects agains XML attacks."; } }