-
-
Notifications
You must be signed in to change notification settings - Fork 32.5k
Added a warning to the urljoin docs, indicating that it is not safe to use with attacker controlled URLs #126659
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
…o use with attacker controlled URLs This was flagged to me at a party today by someone who works in red-teaming as a frequently encountered footgun. Documenting the potentially unexpected behavior seemed like a good place to start.
``urljoin("https://website.com/users/", username)``, if ``username`` can | ||
contain an absolute URL, the result of ``urljoin`` will be the absolute | ||
URL. | ||
|
||
|
||
.. versionchanged:: 3.5 |
This comment was marked as spam.
This comment was marked as spam.
Sorry, something went wrong.
@Eclips4 Thanks for the review! I'm forgetting the workflow here, do I merge? |
Yup. @miss-islington will take care of backports to 3.12 and 3.13. |
Great, thanks. |
Thanks @alex for the PR 🌮🎉.. I'm working now to backport this PR to: 3.12, 3.13. |
…o use with attacker controlled URLs (pythonGH-126659) This was flagged to me at a party today by someone who works in red-teaming as a frequently encountered footgun. Documenting the potentially unexpected behavior seemed like a good place to start. (cherry picked from commit d6bcc15) Co-authored-by: Alex Gaynor <[email protected]>
GH-126888 is a backport of this pull request to the 3.13 branch. |
…o use with attacker controlled URLs (pythonGH-126659) This was flagged to me at a party today by someone who works in red-teaming as a frequently encountered footgun. Documenting the potentially unexpected behavior seemed like a good place to start. (cherry picked from commit d6bcc15) Co-authored-by: Alex Gaynor <[email protected]>
GH-126889 is a backport of this pull request to the 3.12 branch. |
… safe to use with attacker controlled URLs (GH-126659) (#126888) Added a warning to the urljoin docs, indicating that it is not safe to use with attacker controlled URLs (GH-126659) This was flagged to me at a party today by someone who works in red-teaming as a frequently encountered footgun. Documenting the potentially unexpected behavior seemed like a good place to start. (cherry picked from commit d6bcc15) Co-authored-by: Alex Gaynor <[email protected]>
… safe to use with attacker controlled URLs (GH-126659) (#126889) Added a warning to the urljoin docs, indicating that it is not safe to use with attacker controlled URLs (GH-126659) This was flagged to me at a party today by someone who works in red-teaming as a frequently encountered footgun. Documenting the potentially unexpected behavior seemed like a good place to start. (cherry picked from commit d6bcc15) Co-authored-by: Alex Gaynor <[email protected]>
…o use with attacker controlled URLs (pythonGH-126659) This was flagged to me at a party today by someone who works in red-teaming as a frequently encountered footgun. Documenting the potentially unexpected behavior seemed like a good place to start.
…o use with attacker controlled URLs (pythonGH-126659) This was flagged to me at a party today by someone who works in red-teaming as a frequently encountered footgun. Documenting the potentially unexpected behavior seemed like a good place to start.
This was flagged to me at a party today by someone who works in red-teaming as a frequently encountered footgun. Documenting the potentially unexpected behavior seemed like a good place to start.
📚 Documentation preview 📚: https://cpython-previews--126659.org.readthedocs.build/