File tree Expand file tree Collapse file tree 4 files changed +38
-2
lines changed Expand file tree Collapse file tree 4 files changed +38
-2
lines changed Original file line number Diff line number Diff line change @@ -186,8 +186,8 @@ def strip_tags(value):
186
186
value = str (value )
187
187
while '<' in value and '>' in value :
188
188
new_value = _strip_once (value )
189
- if len ( new_value ) >= len ( value ):
190
- # _strip_once was not able to detect more tags
189
+ if value . count ( '<' ) == new_value . count ( '<' ):
190
+ # _strip_once wasn't able to detect more tags.
191
191
break
192
192
value = new_value
193
193
return value
Original file line number Diff line number Diff line change @@ -19,3 +19,20 @@ filters, which were thus vulnerable.
19
19
The regular expressions used by ``Truncator`` have been simplified in order to
20
20
avoid potential backtracking issues. As a consequence, trailing punctuation may
21
21
now at times be included in the truncated output.
22
+
23
+ CVE-2019-14233: Denial-of-service possibility in ``strip_tags()``
24
+ =================================================================
25
+
26
+ Due to the behavior of the underlying ``HTMLParser``,
27
+ :func:`django.utils.html.strip_tags` would be extremely slow to evaluate
28
+ certain inputs containing large sequences of nested incomplete HTML entities.
29
+ The ``strip_tags()`` method is used to implement the corresponding
30
+ :tfilter:`striptags` template filter, which was thus also vulnerable.
31
+
32
+ ``strip_tags()`` now avoids recursive calls to ``HTMLParser`` when progress
33
+ removing tags, but necessarily incomplete HTML entities, stops being made.
34
+
35
+ Remember that absolutely NO guarantee is provided about the results of
36
+ ``strip_tags()`` being HTML safe. So NEVER mark safe the result of a
37
+ ``strip_tags()`` call without escaping it first, for example with
38
+ :func:`django.utils.html.escape`.
Original file line number Diff line number Diff line change @@ -19,3 +19,20 @@ filters, which were thus vulnerable.
19
19
The regular expressions used by ``Truncator`` have been simplified in order to
20
20
avoid potential backtracking issues. As a consequence, trailing punctuation may
21
21
now at times be included in the truncated output.
22
+
23
+ CVE-2019-14233: Denial-of-service possibility in ``strip_tags()``
24
+ =================================================================
25
+
26
+ Due to the behavior of the underlying ``HTMLParser``,
27
+ :func:`django.utils.html.strip_tags` would be extremely slow to evaluate
28
+ certain inputs containing large sequences of nested incomplete HTML entities.
29
+ The ``strip_tags()`` method is used to implement the corresponding
30
+ :tfilter:`striptags` template filter, which was thus also vulnerable.
31
+
32
+ ``strip_tags()`` now avoids recursive calls to ``HTMLParser`` when progress
33
+ removing tags, but necessarily incomplete HTML entities, stops being made.
34
+
35
+ Remember that absolutely NO guarantee is provided about the results of
36
+ ``strip_tags()`` being HTML safe. So NEVER mark safe the result of a
37
+ ``strip_tags()`` call without escaping it first, for example with
38
+ :func:`django.utils.html.escape`.
Original file line number Diff line number Diff line change @@ -88,6 +88,8 @@ def test_strip_tags(self):
88
88
('&gotcha&#;<>' , '&gotcha&#;<>' ),
89
89
('<sc<!-- -->ript>test<<!-- -->/script>' , 'ript>test' ),
90
90
('<script>alert()</script>&h' , 'alert()h' ),
91
+ ('><!' + ('&' * 16000 ) + 'D' , '><!' + ('&' * 16000 ) + 'D' ),
92
+ ('X<<<<br>br>br>br>X' , 'XX' ),
91
93
)
92
94
for value , output in items :
93
95
with self .subTest (value = value , output = output ):
You can’t perform that action at this time.
0 commit comments