File tree Expand file tree Collapse file tree 5 files changed +55
–2
lines changed
Expand file tree Collapse file tree 5 files changed +55
–2
lines changed Original file line number Diff line number Diff line change @@ -187,8 +187,8 @@ def strip_tags(value):
187187 value = str (value )
188188 while '<' in value and '>' in value :
189189 new_value = _strip_once (value )
190- if len ( new_value ) >= len ( value ):
191- # _strip_once was not able to detect more tags
190+ if value . count ( '<' ) == new_value . count ( '<' ):
191+ # _strip_once wasn't able to detect more tags.
192192 break
193193 value = new_value
194194 return value
Original file line number Diff line number Diff line change @@ -19,3 +19,20 @@ filters, which were thus vulnerable.
1919The regular expressions used by ``Truncator`` have been simplified in order to
2020avoid potential backtracking issues. As a consequence, trailing punctuation may
2121now at times be included in the truncated output.
22+
23+ CVE-2019-14233: Denial-of-service possibility in ``strip_tags()``
24+ =================================================================
25+
26+ Due to the behavior of the underlying ``HTMLParser``,
27+ :func:`django.utils.html.strip_tags` would be extremely slow to evaluate
28+ certain inputs containing large sequences of nested incomplete HTML entities.
29+ The ``strip_tags()`` method is used to implement the corresponding
30+ :tfilter:`striptags` template filter, which was thus also vulnerable.
31+
32+ ``strip_tags()`` now avoids recursive calls to ``HTMLParser`` when progress
33+ removing tags, but necessarily incomplete HTML entities, stops being made.
34+
35+ Remember that absolutely NO guarantee is provided about the results of
36+ ``strip_tags()`` being HTML safe. So NEVER mark safe the result of a
37+ ``strip_tags()`` call without escaping it first, for example with
38+ :func:`django.utils.html.escape`.
Original file line number Diff line number Diff line change @@ -19,3 +19,20 @@ filters, which were thus vulnerable.
1919The regular expressions used by ``Truncator`` have been simplified in order to
2020avoid potential backtracking issues. As a consequence, trailing punctuation may
2121now at times be included in the truncated output.
22+
23+ CVE-2019-14233: Denial-of-service possibility in ``strip_tags()``
24+ =================================================================
25+
26+ Due to the behavior of the underlying ``HTMLParser``,
27+ :func:`django.utils.html.strip_tags` would be extremely slow to evaluate
28+ certain inputs containing large sequences of nested incomplete HTML entities.
29+ The ``strip_tags()`` method is used to implement the corresponding
30+ :tfilter:`striptags` template filter, which was thus also vulnerable.
31+
32+ ``strip_tags()`` now avoids recursive calls to ``HTMLParser`` when progress
33+ removing tags, but necessarily incomplete HTML entities, stops being made.
34+
35+ Remember that absolutely NO guarantee is provided about the results of
36+ ``strip_tags()`` being HTML safe. So NEVER mark safe the result of a
37+ ``strip_tags()`` call without escaping it first, for example with
38+ :func:`django.utils.html.escape`.
Original file line number Diff line number Diff line change @@ -20,6 +20,23 @@ The regular expressions used by ``Truncator`` have been simplified in order to
2020avoid potential backtracking issues. As a consequence, trailing punctuation may
2121now at times be included in the truncated output.
2222
23+ CVE-2019-14233: Denial-of-service possibility in ``strip_tags()``
24+ =================================================================
25+
26+ Due to the behavior of the underlying ``HTMLParser``,
27+ :func:`django.utils.html.strip_tags` would be extremely slow to evaluate
28+ certain inputs containing large sequences of nested incomplete HTML entities.
29+ The ``strip_tags()`` method is used to implement the corresponding
30+ :tfilter:`striptags` template filter, which was thus also vulnerable.
31+
32+ ``strip_tags()`` now avoids recursive calls to ``HTMLParser`` when progress
33+ removing tags, but necessarily incomplete HTML entities, stops being made.
34+
35+ Remember that absolutely NO guarantee is provided about the results of
36+ ``strip_tags()`` being HTML safe. So NEVER mark safe the result of a
37+ ``strip_tags()`` call without escaping it first, for example with
38+ :func:`django.utils.html.escape`.
39+
2340Bugfixes
2441========
2542
Original file line number Diff line number Diff line change @@ -88,6 +88,8 @@ def test_strip_tags(self):
8888 ('&gotcha&#;<>' , '&gotcha&#;<>' ),
8989 ('<sc<!-- -->ript>test<<!-- -->/script>' , 'ript>test' ),
9090 ('<script>alert()</script>&h' , 'alert()h' ),
91+ ('><!' + ('&' * 16000 ) + 'D' , '><!' + ('&' * 16000 ) + 'D' ),
92+ ('X<<<<br>br>br>br>X' , 'XX' ),
9193 )
9294 for value , output in items :
9395 with self .subTest (value = value , output = output ):
You can’t perform that action at this time.
0 commit comments