+35
-2
lines changedFilter options
+35
-2
lines changed Original file line number Diff line number Diff line change
@@ -30,7 +30,6 @@
30
30
word_split_re = re.compile(r'(\s+)')
31
31
simple_url_re = re.compile(r'^https?://\[?\w', re.IGNORECASE)
32
32
simple_url_2_re = re.compile(r'^www\.|^(?!http)\w[^@]+\.(com|edu|gov|int|mil|net|org)($|/.*)$', re.IGNORECASE)
33
-
simple_email_re = re.compile(r'^\S+@\S+\.\S+$')
34
33
link_target_attribute_re = re.compile(r'(<a [^>]*?)target=[^\s>]+')
35
34
html_gunk_re = re.compile(
36
35
r'(?:<br clear="all">|<i><\/i>|<b><\/b>|<em><\/em>|<strong><\/strong>|'
@@ -304,6 +303,21 @@ def unescape(text, trail):
304
303
trail = ''
305
304
return text, unescaped, trail
306
305
306
+
def is_email_simple(value):
307
+
"""Return True if value looks like an email address."""
308
+
# An @ must be in the middle of the value.
309
+
if '@' not in value or value.startswith('@') or value.endswith('@'):
310
+
return False
311
+
try:
312
+
p1, p2 = value.split('@')
313
+
except ValueError:
314
+
# value contains more than one @.
315
+
return False
316
+
# Dot must be in p2 (e.g. example.com)
317
+
if '.' not in p2 or p2.startswith('.'):
318
+
return False
319
+
return True
320
+
307
321
words = word_split_re.split(force_text(text))
308
322
for i, word in enumerate(words):
309
323
if '.' in word or '@' in word or ':' in word:
@@ -332,7 +346,7 @@ def unescape(text, trail):
332
346
elif simple_url_2_re.match(middle):
333
347
middle, middle_unescaped, trail = unescape(middle, trail)
334
348
url = smart_urlquote('http://%s' % middle_unescaped)
335
-
elif ':' not in middle and simple_email_re.match(middle):
349
+
elif ':' not in middle and is_email_simple(middle):
336
350
local, domain = middle.rsplit('@', 1)
337
351
try:
338
352
domain = domain.encode('idna').decode('ascii')
Original file line number Diff line number Diff line change
@@ -5,3 +5,14 @@ Django 1.8.19 release notes
5
5
*March 6, 2018*
6
6
7
7
Django 1.8.19 fixes two security issues in 1.18.18.
8
+
9
+
CVE-2018-7536: Denial-of-service possibility in ``urlize`` and ``urlizetrunc`` template filters
10
+
===============================================================================================
11
+
12
+
The ``django.utils.html.urlize()`` function was extremely slow to evaluate
13
+
certain inputs due to a catastrophic backtracking vulnerability in a regular
14
+
expression. The ``urlize()`` function is used to implement the ``urlize`` and
15
+
``urlizetrunc`` template filters, which were thus vulnerable.
16
+
17
+
The problematic regular expression is replaced with parsing logic that behaves
18
+
similarly.
Original file line number Diff line number Diff line change
@@ -248,3 +248,11 @@ def test_html_safe_doesnt_define_str(self):
248
248
@html.html_safe
249
249
class HtmlClass(object):
250
250
pass
251
+
252
+
def test_urlize_unchanged_inputs(self):
253
+
tests = (
254
+
('a' + '@a' * 50000) + 'a', # simple_email_re catastrophic test
255
+
('a' + '.' * 1000000) + 'a', # trailing_punctuation catastrophic test
256
+
)
257
+
for value in tests:
258
+
self.assertEqual(html.urlize(value), value)
You can’t perform that action at this time.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4