]> git.ipfire.org Git - thirdparty/Python/cpython.git/commit
[3.10] [3.11] gh-102153: Start stripping C0 control and space chars in `urlsplit...
authorMiss Islington (bot) <31488909+miss-islington@users.noreply.github.com>
Wed, 17 May 2023 23:06:06 +0000 (16:06 -0700)
committerGitHub <noreply@github.com>
Wed, 17 May 2023 23:06:06 +0000 (16:06 -0700)
commitf48a96a28012d28ae37a2f4587a780a5eb779946
treec9d5e9271a27e75b4f394ba441da49a8df4bd176
parent425065bb002b9cbf9c12f61a6f3102f2ce2b8d14
[3.10] [3.11] gh-102153: Start stripping C0 control and space chars in `urlsplit` (GH-102508) (GH-104575) (#104592)

gh-102153: Start stripping C0 control and space chars in `urlsplit` (GH-102508)

`urllib.parse.urlsplit` has already been respecting the WHATWG spec a bit GH-25595.

This adds more sanitizing to respect the "Remove any leading C0 control or space from input" [rule](https://url.spec.whatwg.org/GH-url-parsing:~:text=Remove%20any%20leading%20and%20trailing%20C0%20control%20or%20space%20from%20input.) in response to [CVE-2023-24329](https://nvd.nist.gov/vuln/detail/CVE-2023-24329).

I simplified the docs by eliding the state of the world explanatory
paragraph in this security release only backport.  (people will see
that in the mainline /3/ docs)

---------

(cherry picked from commit 2f630e1ce18ad2e07428296532a68b11dc66ad10)
(cherry picked from commit 610cc0ab1b760b2abaac92bd256b96191c46b941)

Co-authored-by: Miss Islington (bot) <31488909+miss-islington@users.noreply.github.com>
Co-authored-by: Illia Volochii <illia.volochii@gmail.com>
Co-authored-by: Gregory P. Smith [Google] <greg@krypto.org>
Doc/library/urllib.parse.rst
Lib/test/test_urlparse.py
Lib/urllib/parse.py
Misc/NEWS.d/next/Security/2023-03-07-20-59-17.gh-issue-102153.14CLSZ.rst [new file with mode: 0644]