From: Stan Ulbrych Date: Mon, 13 Apr 2026 21:41:51 +0000 (+0100) Subject: [3.11] gh-148169: Fix webbrowser `%action` substitution bypass of dash-prefix check... X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=f4654824ae0850ac87227fb270f9057477946769;p=thirdparty%2FPython%2Fcpython.git [3.11] gh-148169: Fix webbrowser `%action` substitution bypass of dash-prefix check (GH-148170) (#148520) (cherry picked from commit d22922c8a7958353689dc4763dd72da2dea03fff) --- diff --git a/Lib/test/test_webbrowser.py b/Lib/test/test_webbrowser.py index 74eca81c707e..f10f54e4d4ec 100644 --- a/Lib/test/test_webbrowser.py +++ b/Lib/test/test_webbrowser.py @@ -103,6 +103,14 @@ class ChromeCommandTest(CommandTestMixin, unittest.TestCase): options=[], arguments=[URL]) + def test_reject_action_dash_prefixes(self): + browser = self.browser_class(name=CMD_NAME) + with self.assertRaises(ValueError): + browser.open('%action--incognito') + # new=1: action is "--new-window", so "%action" itself expands to + # a dash-prefixed flag even with no dash in the original URL. + with self.assertRaises(ValueError): + browser.open('%action', new=1) class MozillaCommandTest(CommandTestMixin, unittest.TestCase): diff --git a/Lib/webbrowser.py b/Lib/webbrowser.py index ce6ec9a27d7d..9819a4ecf6d4 100755 --- a/Lib/webbrowser.py +++ b/Lib/webbrowser.py @@ -265,7 +265,6 @@ class UnixBrowser(BaseBrowser): def open(self, url, new=0, autoraise=True): sys.audit("webbrowser.open", url) - self._check_url(url) if new == 0: action = self.remote_action elif new == 1: @@ -279,7 +278,9 @@ class UnixBrowser(BaseBrowser): raise Error("Bad 'new' parameter to open(); " + "expected 0, 1, or 2, got %s" % new) - args = [arg.replace("%s", url).replace("%action", action) + self._check_url(url.replace("%action", action)) + + args = [arg.replace("%action", action).replace("%s", url) for arg in self.remote_args] args = [arg for arg in args if arg] success = self._invoke(args, True, autoraise, url) diff --git a/Misc/NEWS.d/next/Security/2026-03-31-09-15-51.gh-issue-148169.EZJzz2.rst b/Misc/NEWS.d/next/Security/2026-03-31-09-15-51.gh-issue-148169.EZJzz2.rst new file mode 100644 index 000000000000..45cdeebe1b6d --- /dev/null +++ b/Misc/NEWS.d/next/Security/2026-03-31-09-15-51.gh-issue-148169.EZJzz2.rst @@ -0,0 +1,2 @@ +A bypass in :mod:`webbrowser` allowed URLs prefixed with ``%action`` to pass +the dash-prefix safety check.