From: tierno Date: Tue, 21 Jul 2020 12:01:02 +0000 (+0000) Subject: fix 1185: XSS vulnerability in the URL X-Git-Tag: release-v9.0-start~23 X-Git-Url: https://osm.etsi.org/gitweb/?p=osm%2FNBI.git;a=commitdiff_plain;h=234538773aeba6182c97feda94073ed22cd51b1e fix 1185: XSS vulnerability in the URL Change-Id: I5c28e2992211529494072e867ee87f395e143589 Signed-off-by: tierno --- diff --git a/osm_nbi/html_out.py b/osm_nbi/html_out.py index b344aff..316e15b 100644 --- a/osm_nbi/html_out.py +++ b/osm_nbi/html_out.py @@ -153,9 +153,11 @@ def format(data, request, response, toke_info): return html_auth2.format(error=data) if request.path_info in ("/version", "/system"): return "
" + yaml.safe_dump(data, explicit_start=False, indent=4, default_flow_style=False) + "
" - body = html_body.format(item=request.path_info) + body = html_body.format(item=html_escape(request.path_info)) if response.status and response.status > 202: - body += html_body_error.format(yaml.safe_dump(data, explicit_start=True, indent=4, default_flow_style=False)) + # input request.path_info (URL) can contain XSS that are translated into output error detail + body += html_body_error.format(html_escape( + yaml.safe_dump(data, explicit_start=True, indent=4, default_flow_style=False))) elif isinstance(data, (list, tuple)): if request.path_info == "/vnfpkgm/v1/vnf_packages": body += html_upload_body.format(request.path_info + "_content", "VNFD")