]> git.ipfire.org Git - thirdparty/Python/cpython.git/commit
[3.9] gh-102153: Start stripping C0 control and space chars in `urlsplit` (GH-102508...
authorMiss Islington (bot) <31488909+miss-islington@users.noreply.github.com>
Mon, 22 May 2023 10:42:37 +0000 (03:42 -0700)
committerGitHub <noreply@github.com>
Mon, 22 May 2023 10:42:37 +0000 (12:42 +0200)
commitd7f8a5fe07b0ff3a419ccec434cc405b21a5a304
treec35357dc7235da437f0793e1757aff6da8481056
parent3d5dd1eee265ec43dd96d89656c2a1c207dd5815
[3.9] gh-102153: Start stripping C0 control and space chars in `urlsplit` (GH-102508) (GH-104575) (GH-104592) (#104593)

gh-102153: Start stripping C0 control and space chars in `urlsplit` (GH-102508)

`urllib.parse.urlsplit` has already been respecting the WHATWG spec a bit GH-25595.

This adds more sanitizing to respect the "Remove any leading C0 control or space from input" [rule](https://url.spec.whatwg.org/GH-url-parsing:~:text=Remove%20any%20leading%20and%20trailing%20C0%20control%20or%20space%20from%20input.) in response to [CVE-2023-24329](https://nvd.nist.gov/vuln/detail/CVE-2023-24329).

I simplified the docs by eliding the state of the world explanatory
paragraph in this security release only backport.  (people will see
that in the mainline /3/ docs)

(cherry picked from commit 2f630e1ce18ad2e07428296532a68b11dc66ad10)
(cherry picked from commit 610cc0ab1b760b2abaac92bd256b96191c46b941)
(cherry picked from commit f48a96a28012d28ae37a2f4587a780a5eb779946)

Co-authored-by: Illia Volochii <illia.volochii@gmail.com>
Co-authored-by: Gregory P. Smith [Google] <greg@krypto.org>
Doc/library/urllib.parse.rst
Lib/test/test_urlparse.py
Lib/urllib/parse.py
Misc/NEWS.d/next/Security/2023-03-07-20-59-17.gh-issue-102153.14CLSZ.rst [new file with mode: 0644]