Thank ntozier
Now that the issue has been identified --- Is there anyway to suppress html tag stripping by HTMLawed?
Thanks!!
HTML tags are getting stripped
I managed to fix this issue by commenting the following line:
includes / class.format.php
$text = Format::safe_html($text, array('spec' => $spec));
I'm not sure if this the best solution but it does the job.
Thanks @ntozier for pointing me in the right direction
- Edited
rsclmumbai I must admit I noticed a similar (or probably identical) issue when using <. Somebody raised a ticket about purchasing consumables and my reply included "<ยฃ100"... everything after the < was stripped ๏ธ
I suppose a better option (anyone can feel free to correct me if there are issues here I haven't noticed ) would be to convert any < entered in the reply field into <... probably the same way this forum does! I'm too lazy to create a Github account just to post this though
@RBGE Agree. Simply converting < into < & > into > takes care of security and content. Since OSTicket uses a ready library HTMLawed, its a default implementation I guess by the library.
A small issue. My solution above only works for HTML emails.
@ntozier Can you suggest what should be tweaked for TEXT emails?
Thanks a ton in advance!!
I scanned the entire class.format.php file but could not locate any function or code which works for text emails. Any pointers are appreciated.
Thanks
rsclmumbai
Take a look at this its little old but may help
https://github.com/osTicket/osTicket/issues/3479
change line 218 from ./scp/js/scp.js
from
redactor.insert.html(canned.response);
to
redactor.insert.html(canned.response, false);
false means no stripping...
https://github.com/osTicket/osTicket/commit/82c31641375424c69b6103a00719ea246c288f9a
Thanks @ramrajone
In the latest version of OSTicket, this code is on line 238.
redactor.insert.html(canned.response, false);
I modified the code as you recommended but it did not help. In my case though, the issue is not with canned responses but with incoming text/plain emails. This issue if really hitting me hard.
It would be really great if someone can suggest a code edit.
Just to recap, commenting the following line helped in fixing this issue with text/html emails.
includes / class.format.php
#$text = Format::safe_html($text, array('spec' => $spec));
But I'm unable to find the code which needs to be modified for text/plain emails.
Thanks in advance!
Take a look at this link, the reason HTML tags removed for incoming emails to help protect vulnerable to XSS:
https://github.com/osTicket/osTicket/issues/4511
https://github.com/osTicket/osTicket/issues/3791#issuecomment-500506685
Thanks @ramrajone but I did not really follow what you are trying to convey
I checked both the links you shared and I agree, HTMLawed is improving security. In my case, since its a specific use case, I need to show content between <>.
My mail server is hosted on Cpanel, I'm trying to see if I can make any changes to the incoming email on-the-fly and convert it from text/plain to text/html. Fortunately, I'm able to bypass the filters for html emails.
Thanks again
On another note, what changes can I make to completely bypass HTMLawed for all types of emails - text & html?
rsclmumbai
again not best security practice, but I think you can, I am not sure maybe DevTeam can confirm @KevinTheJedi
https://github.com/osTicket/osTicket/blob/develop/include/class.format.php#L338-L347
Line: 345
function sanitize($text, $striptags=false, $spec=false)
Already done that. My code looks like this:
` function sanitize($text, $striptags=false, $spec=false) {
//balance and neutralize unsafe tags.
//$text = Format::safe_html($text, array('spec' => $spec));
//above line commented on 2020-02-05 to avoid stripping of <111111>
$text = self::localizeInlineImages($text);
//If requested - strip tags with decoding disabled.
return $striptags?Format::striptags($text, false):$text;
}`
This is working fine but only for text/html emails.
If I get an email with content-type = text/plain, then the <xxx> is still stripping.
rsclmumbai
Do you have Enabled Rich Text?
/scp/settings.php
Thanks @KevinTheJedi -- it worked.
File: include/class.thread.php
inside the class:
class TextThreadEntryBody extends ThreadEntryBody {
I commented the following code:
function getClean() {
return Format::htmlchars(Format::html_balance(Format::stripEmptyLines(parent::getClean())));
}
Hope it helps others looking for a similar solution.
Happy weekend!!
I hope no one else implements this as itโs a security risk. This does not open you to XSS attacks only, people can use XSS to start different, more serious attacks or possibly execute a different attack altogether. Just all around not a good idea. I understand your use case and such but really not a good idea from security standpoint.
At some point in the future we hope to implement code blocks or something similar to say โDonโt sanitize/balance content inside this block of codeโ. This will alleviate most of these types of issues. This is not set in stone, just on our feature request list.
Cheers.
Thanks @KevinTheJedi
I totally agree with you. I'm able to take this risk since we are using OSTicket strictly internally.
Nevertheless, I hope to see the Don't Sanitize..... feature in the future releases.
Thanks for the awesome helpdesk system & superb support!!
@KevinTheJedi was there ever any progress on this? I know it was a couple of years ago now...