]> git.ipfire.org Git - thirdparty/Python/cpython.git/commit
[3.11] gh-102153: Start stripping C0 control and space chars in `urlsplit` (GH-102508...
authorMiss Islington (bot) <31488909+miss-islington@users.noreply.github.com>
Wed, 17 May 2023 21:41:25 +0000 (14:41 -0700)
committerGitHub <noreply@github.com>
Wed, 17 May 2023 21:41:25 +0000 (21:41 +0000)
commit610cc0ab1b760b2abaac92bd256b96191c46b941
tree378689b73ff9c18743be122ac215a1ee82c7bd1e
parent0560fd3f9874d577f0fe3d7a47fd3c46b16af068
[3.11] gh-102153: Start stripping C0 control and space chars in `urlsplit` (GH-102508) (#104575)

* gh-102153: Start stripping C0 control and space chars in `urlsplit` (GH-102508)

`urllib.parse.urlsplit` has already been respecting the WHATWG spec a bit GH-25595.

This adds more sanitizing to respect the "Remove any leading C0 control or space from input" [rule](https://url.spec.whatwg.org/GH-url-parsing:~:text=Remove%20any%20leading%20and%20trailing%20C0%20control%20or%20space%20from%20input.) in response to [CVE-2023-24329](https://nvd.nist.gov/vuln/detail/CVE-2023-24329).

---------

(cherry picked from commit 2f630e1ce18ad2e07428296532a68b11dc66ad10)

Co-authored-by: Illia Volochii <illia.volochii@gmail.com>
Co-authored-by: Gregory P. Smith [Google] <greg@krypto.org>
Doc/library/urllib.parse.rst
Lib/test/test_urlparse.py
Lib/urllib/parse.py
Misc/NEWS.d/next/Security/2023-03-07-20-59-17.gh-issue-102153.14CLSZ.rst [new file with mode: 0644]