mirror of
https://github.com/django/django.git
synced 2025-10-24 06:06:09 +00:00
Fixed CVE-2016-2512 -- Prevented spoofing is_safe_url() with basic auth.
This is a security fix.
This commit is contained in:
committed by
Tim Graham
parent
f43291639b
commit
c5544d2892
@@ -97,6 +97,11 @@ class TestUtilsHttp(unittest.TestCase):
|
||||
'javascript:alert("XSS")',
|
||||
'\njavascript:alert(x)',
|
||||
'\x08//example.com',
|
||||
r'http://otherserver\@example.com',
|
||||
r'http:\\testserver\@example.com',
|
||||
r'http://testserver\me:pass@example.com',
|
||||
r'http://testserver\@example.com',
|
||||
r'http:\\testserver\confirm\me@example.com',
|
||||
'\n'):
|
||||
self.assertFalse(http.is_safe_url(bad_url, host='testserver'), "%s should be blocked" % bad_url)
|
||||
for good_url in ('/view/?param=http://example.com',
|
||||
@@ -106,8 +111,15 @@ class TestUtilsHttp(unittest.TestCase):
|
||||
'https://testserver/',
|
||||
'HTTPS://testserver/',
|
||||
'//testserver/',
|
||||
'http://testserver/confirm?email=me@example.com',
|
||||
'/url%20with%20spaces/'):
|
||||
self.assertTrue(http.is_safe_url(good_url, host='testserver'), "%s should be allowed" % good_url)
|
||||
# Valid basic auth credentials are allowed.
|
||||
self.assertTrue(http.is_safe_url(r'http://user:pass@testserver/', host='user:pass@testserver'))
|
||||
# A path without host is allowed.
|
||||
self.assertTrue(http.is_safe_url('/confirm/me@example.com'))
|
||||
# Basic auth without host is not allowed.
|
||||
self.assertFalse(http.is_safe_url(r'http://testserver\@example.com'))
|
||||
|
||||
def test_urlsafe_base64_roundtrip(self):
|
||||
bytestring = b'foo'
|
||||
|
||||
Reference in New Issue
Block a user