mirror of
https://github.com/django/django.git
synced 2025-01-20 15:19:20 +00:00
Fixed CVE-2024-38875 -- Mitigated potential DoS in urlize and urlizetrunc template filters.
Thank you to Elias Myllymäki for the report. Co-authored-by: Sarah Boyce <42296566+sarahboyce@users.noreply.github.com>
This commit is contained in:
parent
af84bcc8d1
commit
d666457453
@ -9,7 +9,7 @@ from urllib.parse import parse_qsl, quote, unquote, urlencode, urlsplit, urlunsp
|
|||||||
|
|
||||||
from django.utils.deprecation import RemovedInDjango60Warning
|
from django.utils.deprecation import RemovedInDjango60Warning
|
||||||
from django.utils.encoding import punycode
|
from django.utils.encoding import punycode
|
||||||
from django.utils.functional import Promise, keep_lazy, keep_lazy_text
|
from django.utils.functional import Promise, cached_property, keep_lazy, keep_lazy_text
|
||||||
from django.utils.http import RFC3986_GENDELIMS, RFC3986_SUBDELIMS
|
from django.utils.http import RFC3986_GENDELIMS, RFC3986_SUBDELIMS
|
||||||
from django.utils.regex_helper import _lazy_re_compile
|
from django.utils.regex_helper import _lazy_re_compile
|
||||||
from django.utils.safestring import SafeData, SafeString, mark_safe
|
from django.utils.safestring import SafeData, SafeString, mark_safe
|
||||||
@ -257,6 +257,16 @@ def smart_urlquote(url):
|
|||||||
return urlunsplit((scheme, netloc, path, query, fragment))
|
return urlunsplit((scheme, netloc, path, query, fragment))
|
||||||
|
|
||||||
|
|
||||||
|
class CountsDict(dict):
|
||||||
|
def __init__(self, *args, word, **kwargs):
|
||||||
|
super().__init__(*args, *kwargs)
|
||||||
|
self.word = word
|
||||||
|
|
||||||
|
def __missing__(self, key):
|
||||||
|
self[key] = self.word.count(key)
|
||||||
|
return self[key]
|
||||||
|
|
||||||
|
|
||||||
class Urlizer:
|
class Urlizer:
|
||||||
"""
|
"""
|
||||||
Convert any URLs in text into clickable links.
|
Convert any URLs in text into clickable links.
|
||||||
@ -362,40 +372,72 @@ class Urlizer:
|
|||||||
return x
|
return x
|
||||||
return "%s…" % x[: max(0, limit - 1)]
|
return "%s…" % x[: max(0, limit - 1)]
|
||||||
|
|
||||||
|
@cached_property
|
||||||
|
def wrapping_punctuation_openings(self):
|
||||||
|
return "".join(dict(self.wrapping_punctuation).keys())
|
||||||
|
|
||||||
|
@cached_property
|
||||||
|
def trailing_punctuation_chars_no_semicolon(self):
|
||||||
|
return self.trailing_punctuation_chars.replace(";", "")
|
||||||
|
|
||||||
|
@cached_property
|
||||||
|
def trailing_punctuation_chars_has_semicolon(self):
|
||||||
|
return ";" in self.trailing_punctuation_chars
|
||||||
|
|
||||||
def trim_punctuation(self, word):
|
def trim_punctuation(self, word):
|
||||||
"""
|
"""
|
||||||
Trim trailing and wrapping punctuation from `word`. Return the items of
|
Trim trailing and wrapping punctuation from `word`. Return the items of
|
||||||
the new state.
|
the new state.
|
||||||
"""
|
"""
|
||||||
lead, middle, trail = "", word, ""
|
# Strip all opening wrapping punctuation.
|
||||||
|
middle = word.lstrip(self.wrapping_punctuation_openings)
|
||||||
|
lead = word[: len(word) - len(middle)]
|
||||||
|
trail = ""
|
||||||
|
|
||||||
# Continue trimming until middle remains unchanged.
|
# Continue trimming until middle remains unchanged.
|
||||||
trimmed_something = True
|
trimmed_something = True
|
||||||
while trimmed_something:
|
counts = CountsDict(word=middle)
|
||||||
|
while trimmed_something and middle:
|
||||||
trimmed_something = False
|
trimmed_something = False
|
||||||
# Trim wrapping punctuation.
|
# Trim wrapping punctuation.
|
||||||
for opening, closing in self.wrapping_punctuation:
|
for opening, closing in self.wrapping_punctuation:
|
||||||
if middle.startswith(opening):
|
if counts[opening] < counts[closing]:
|
||||||
middle = middle.removeprefix(opening)
|
rstripped = middle.rstrip(closing)
|
||||||
lead += opening
|
if rstripped != middle:
|
||||||
trimmed_something = True
|
strip = counts[closing] - counts[opening]
|
||||||
# Keep parentheses at the end only if they're balanced.
|
trail = middle[-strip:]
|
||||||
if (
|
middle = middle[:-strip]
|
||||||
middle.endswith(closing)
|
trimmed_something = True
|
||||||
and middle.count(closing) == middle.count(opening) + 1
|
counts[closing] -= strip
|
||||||
):
|
|
||||||
middle = middle.removesuffix(closing)
|
rstripped = middle.rstrip(self.trailing_punctuation_chars_no_semicolon)
|
||||||
trail = closing + trail
|
if rstripped != middle:
|
||||||
trimmed_something = True
|
trail = middle[len(rstripped) :] + trail
|
||||||
# Trim trailing punctuation (after trimming wrapping punctuation,
|
middle = rstripped
|
||||||
# as encoded entities contain ';'). Unescape entities to avoid
|
|
||||||
# breaking them by removing ';'.
|
|
||||||
middle_unescaped = html.unescape(middle)
|
|
||||||
stripped = middle_unescaped.rstrip(self.trailing_punctuation_chars)
|
|
||||||
if middle_unescaped != stripped:
|
|
||||||
punctuation_count = len(middle_unescaped) - len(stripped)
|
|
||||||
trail = middle[-punctuation_count:] + trail
|
|
||||||
middle = middle[:-punctuation_count]
|
|
||||||
trimmed_something = True
|
trimmed_something = True
|
||||||
|
|
||||||
|
if self.trailing_punctuation_chars_has_semicolon and middle.endswith(";"):
|
||||||
|
# Only strip if not part of an HTML entity.
|
||||||
|
amp = middle.rfind("&")
|
||||||
|
if amp == -1:
|
||||||
|
can_strip = True
|
||||||
|
else:
|
||||||
|
potential_entity = middle[amp:]
|
||||||
|
escaped = html.unescape(potential_entity)
|
||||||
|
can_strip = (escaped == potential_entity) or escaped.endswith(";")
|
||||||
|
|
||||||
|
if can_strip:
|
||||||
|
rstripped = middle.rstrip(";")
|
||||||
|
amount_stripped = len(middle) - len(rstripped)
|
||||||
|
if amp > -1 and amount_stripped > 1:
|
||||||
|
# Leave a trailing semicolon as might be an entity.
|
||||||
|
trail = middle[len(rstripped) + 1 :] + trail
|
||||||
|
middle = rstripped + ";"
|
||||||
|
else:
|
||||||
|
trail = middle[len(rstripped) :] + trail
|
||||||
|
middle = rstripped
|
||||||
|
trimmed_something = True
|
||||||
|
|
||||||
return lead, middle, trail
|
return lead, middle, trail
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
|
@ -7,3 +7,9 @@ Django 4.2.14 release notes
|
|||||||
Django 4.2.14 fixes two security issues with severity "moderate" and two
|
Django 4.2.14 fixes two security issues with severity "moderate" and two
|
||||||
security issues with severity "low" in 4.2.13.
|
security issues with severity "low" in 4.2.13.
|
||||||
|
|
||||||
|
CVE-2024-38875: Potential denial-of-service vulnerability in ``django.utils.html.urlize()``
|
||||||
|
===========================================================================================
|
||||||
|
|
||||||
|
:tfilter:`urlize` and :tfilter:`urlizetrunc` were subject to a potential
|
||||||
|
denial-of-service attack via certain inputs with a very large number of
|
||||||
|
brackets.
|
||||||
|
@ -7,6 +7,13 @@ Django 5.0.7 release notes
|
|||||||
Django 5.0.7 fixes two security issues with severity "moderate", two security
|
Django 5.0.7 fixes two security issues with severity "moderate", two security
|
||||||
issues with severity "low", and several bugs in 5.0.6.
|
issues with severity "low", and several bugs in 5.0.6.
|
||||||
|
|
||||||
|
CVE-2024-38875: Potential denial-of-service vulnerability in ``django.utils.html.urlize()``
|
||||||
|
===========================================================================================
|
||||||
|
|
||||||
|
:tfilter:`urlize` and :tfilter:`urlizetrunc` were subject to a potential
|
||||||
|
denial-of-service attack via certain inputs with a very large number of
|
||||||
|
brackets.
|
||||||
|
|
||||||
Bugfixes
|
Bugfixes
|
||||||
========
|
========
|
||||||
|
|
||||||
|
@ -352,6 +352,13 @@ class TestUtilsHtml(SimpleTestCase):
|
|||||||
"foo@.example.com",
|
"foo@.example.com",
|
||||||
"foo@localhost",
|
"foo@localhost",
|
||||||
"foo@localhost.",
|
"foo@localhost.",
|
||||||
|
# trim_punctuation catastrophic tests
|
||||||
|
"(" * 100_000 + ":" + ")" * 100_000,
|
||||||
|
"(" * 100_000 + "&:" + ")" * 100_000,
|
||||||
|
"([" * 100_000 + ":" + "])" * 100_000,
|
||||||
|
"[(" * 100_000 + ":" + ")]" * 100_000,
|
||||||
|
"([[" * 100_000 + ":" + "]])" * 100_000,
|
||||||
|
"&:" + ";" * 100_000,
|
||||||
)
|
)
|
||||||
for value in tests:
|
for value in tests:
|
||||||
with self.subTest(value=value):
|
with self.subTest(value=value):
|
||||||
|
Loading…
x
Reference in New Issue
Block a user