diff --git a/lib/phlex/sgml.rb b/lib/phlex/sgml.rb
index c94a78ea..77d5e6e4 100644
--- a/lib/phlex/sgml.rb
+++ b/lib/phlex/sgml.rb
@@ -274,7 +274,7 @@ def capture(&block)
end
lower_name = name.downcase
- next if lower_name == "href" && v.start_with?(/\s*javascript:/i)
+ next if lower_name == "href" && v.to_s.downcase.tr("\t \n", "").start_with?("javascript:")
# Detect unsafe attribute names. Attribute names are considered unsafe if they match an event attribute or include unsafe characters.
if HTML::EVENT_ATTRIBUTES[lower_name] || name.match?(/[<>&"']/)
diff --git a/lib/phlex/version.rb b/lib/phlex/version.rb
index a1d91b6d..b49ee733 100644
--- a/lib/phlex/version.rb
+++ b/lib/phlex/version.rb
@@ -1,5 +1,5 @@
# frozen_string_literal: true
module Phlex
- VERSION = "1.5.2"
+ VERSION = "1.5.3"
end
diff --git a/test/phlex/view/naughty_business.rb b/test/phlex/view/naughty_business.rb
index 6e1dce7a..139f62d7 100644
--- a/test/phlex/view/naughty_business.rb
+++ b/test/phlex/view/naughty_business.rb
@@ -85,6 +85,78 @@ def template
end
end
+ with "naughty javascript link protocol with a hidden tab character" do
+ view do
+ def template
+ a(href: "\tjavascript:alert(1)") { "XSS" }
+ a(href: "j\tavascript:alert(1)") { "XSS" }
+ a(href: "ja\tvascript:alert(1)") { "XSS" }
+ a(href: "jav\tascript:alert(1)") { "XSS" }
+ a(href: "java\tscript:alert(1)") { "XSS" }
+ a(href: "javas\tcript:alert(1)") { "XSS" }
+ a(href: "javasc\tript:alert(1)") { "XSS" }
+ a(href: "javascr\tipt:alert(1)") { "XSS" }
+ a(href: "javascri\tpt:alert(1)") { "XSS" }
+ a(href: "javascrip\tt:alert(1)") { "XSS" }
+ a(href: "javascript\t:alert(1)") { "XSS" }
+ a(href: "javascript:\talert(1)") { "XSS" }
+ end
+ end
+
+ it "strips the javascript protocol" do
+ expect(output.scan("").size).to be == 12
+ expect(output.scan("href").size).to be == 0
+ end
+ end
+
+ with "naughty javascript link protocol with a hidden newline character" do
+ view do
+ def template
+ a(href: "\njavascript:alert(1)") { "XSS" }
+ a(href: "j\navascript:alert(1)") { "XSS" }
+ a(href: "ja\nvascript:alert(1)") { "XSS" }
+ a(href: "jav\nascript:alert(1)") { "XSS" }
+ a(href: "java\nscript:alert(1)") { "XSS" }
+ a(href: "javas\ncript:alert(1)") { "XSS" }
+ a(href: "javasc\nript:alert(1)") { "XSS" }
+ a(href: "javascr\nipt:alert(1)") { "XSS" }
+ a(href: "javascri\npt:alert(1)") { "XSS" }
+ a(href: "javascrip\nt:alert(1)") { "XSS" }
+ a(href: "javascript\n:alert(1)") { "XSS" }
+ a(href: "javascript:\nalert(1)") { "XSS" }
+ end
+ end
+
+ it "strips the javascript protocol" do
+ expect(output.scan("").size).to be == 12
+ expect(output.scan("href").size).to be == 0
+ end
+ end
+
+ with "naughty javascript link protocol with a hidden whitespace character" do
+ view do
+ def template
+ a(href: " javascript:alert(1)") { "XSS" }
+ a(href: "j avascript:alert(1)") { "XSS" }
+ a(href: "ja vascript:alert(1)") { "XSS" }
+ a(href: "jav ascript:alert(1)") { "XSS" }
+ a(href: "java script:alert(1)") { "XSS" }
+ a(href: "javas cript:alert(1)") { "XSS" }
+ a(href: "javasc ript:alert(1)") { "XSS" }
+ a(href: "javascr ipt:alert(1)") { "XSS" }
+ a(href: "javascri pt:alert(1)") { "XSS" }
+ a(href: "javascrip t:alert(1)") { "XSS" }
+ a(href: "javascript :alert(1)") { "XSS" }
+ a(href: "javascript: alert(1)") { "XSS" }
+ end
+ end
+
+ it "strips the javascript protocol" do
+ expect(output.scan("").size).to be == 12
+ expect(output.scan("href").size).to be == 0
+ end
+ end
+
Phlex::HTML::EVENT_ATTRIBUTES.each_key do |event_attribute|
with "with naughty #{event_attribute} attribute" do
naughty_attributes = { event_attribute => "alert(1);" }