Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[3.8] gh-102153: Start stripping C0 control and space chars in `urlsp… #104918

Closed
wants to merge 2 commits into from

Conversation

ngie-eign
Copy link
Contributor

…lit`

gh-102153: Start stripping C0 control and space chars in urlsplit (GH-102508)

urllib.parse.urlsplit has already been respecting the WHATWG spec a bit GH-25595.

This adds more sanitizing to respect the "Remove any leading C0 control or space from input" rule in response to CVE-2023-24329.

I simplified the docs by eliding the state of the world explanatory paragraph in this security release only backport. (people will see that in the mainline /3/ docs)

PR Note

This is a manual back port of the fix originally pushed to main as 2f630e1.

…`urlsplit`

pythongh-102153: Start stripping C0 control and space chars in `urlsplit` (pythonGH-102508)

`urllib.parse.urlsplit` has already been respecting the WHATWG spec a bit pythonGH-25595.

This adds more sanitizing to respect the "Remove any leading C0 control or space from input" [rule](https://url.spec.whatwg.org/GH-url-parsing:~:text=Remove%20any%20leading%20and%20trailing%20C0%20control%20or%20space%20from%20input.) in response to [CVE-2023-24329](https://nvd.nist.gov/vuln/detail/CVE-2023-24329).

I simplified the docs by eliding the state of the world explanatory
paragraph in this security release only backport.  (people will see
that in the mainline /3/ docs)

Co-authored-by: Illia Volochii <illia.volochii@gmail.com>
Co-authored-by: Gregory P. Smith [Google] <greg@krypto.org>
Co-authored-by: Enji Cooper <yaneurabeya@gmail.com>
@ned-deily
Copy link
Member

Thanks for the PR. However, a backport to 3.8 for this issue already exists as pending PR #104895.

@ned-deily ned-deily closed this Jun 4, 2023
@ngie-eign ngie-eign deleted the 3.8-CVE-2023-24329 branch June 6, 2023 00:09
@ngie-eign
Copy link
Contributor Author

Thanks for the PR. However, a backport to 3.8 for this issue already exists as pending PR #104895.

Wonderful -- thank you for the heads up!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants