-
-
Notifications
You must be signed in to change notification settings - Fork 606
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Flag markupsafe.Markup
on non-literal content
#1067
Comments
There's sort of already an existing pull request for this #877 (it uses the flask alias I would also be very interested in adding a rule or extend the existing B308 rule for this. The proposed implementation in the existing pull request would raise a ton of false positives though and I think we can do better for B308 as well. Since passing string literals should always be safe. It's only once you're passing in dynamic content, that you may be exposing yourself to a XSS vulnerability. I would be happy to put some time into creating a pull request of my own, if the maintainers are open to a change here. |
Ah yeah I searched for mentions of markupsafe so I missed it (also I think I didn't look for PRs anyway so I'd have missed it regardless).
I would agree, if django as support in core it doesn't make much sense for this not to be even if it were just for flask, but even more so as it's used by multiple projects inside and outside the Pocoo org. including jinja which already has core support. The reasoning could make sense if the Django and Jinja support were moved out of core and bandit-core only concerned itself with the stdlib I guess.
Absolutely, the rule should not trigger for literal content (though it should for f-strings, I've no idea whether bandit can easily make the distinction as I know nothing of the implementation details). If |
It's quite easy to detect in the python AST if an argument is a pure literal string or something else (including f-strings). |
@ericwb @lukehinds @sigmavirus24 I would love for one of the maintainers to chime in on this. |
Oh yeah if bandit just uses ast then it's not difficult, especially if you don't bother trying to const-evaluate things (or at least not more than trivially). |
Is your feature request related to a problem? Please describe.
markupsafe.Markup
is semantically similar to Django'smark_safe
(orSafeString
) (B308), it marks the wrapped string as passing unmodified throughmarkupsafe.escape
.Notably,
markupsafe
is what Jinja relies on for its (auto)-escaping, it is explicitly documented in that context.Markup
-ing literal content is normally safe, but non-literal content either is suspicious, or should be formatted in viaMarkup.format
orMarkup.__mod__
(which automatically escapes non-Markup
content).Describe the solution you'd like
Bandit flagging such uses, maybe as part of B308, maybe as a new and separate diagnosis.
Also maybe
django.utils.safestring.SafeString
anddjango.utils.safestring.SafeText
should be added to B308?mark_safe
is just a pretty thin wrapper aroundSafeString
which handles the__html__
protocol and can be used as a decorator.The text was updated successfully, but these errors were encountered: