Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add flask.Markup XSS plugin #877

Open
wants to merge 2 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
74 changes: 74 additions & 0 deletions bandit/plugins/flask_markup_xss.py
@@ -0,0 +1,74 @@
# Copyright (c) 2022 Rajesh Pangare
#
# SPDX-License-Identifier: Apache-2.0
r"""
====================================================
B704: Test for use of flask.Markup
====================================================

``Markup`` accepts a string or an object that is converted
to text, and wraps it to mark it safe without escaping. Calling
``Markup`` on data submitted by users could lead to XSS.

Do not use ``Markup`` or ``Markup.unescape`` on untrusted data.
Use ``Markup.escape`` to escape unsafe HTML.

:Example:
>> Issue: [B704:flask_markup_xss] Potential XSS
`with `flask.Markup``. Do not use ``Markup`` or
``Markup.unescape`` on untrusted data. Use
``Markup.escape`` to escape untrusted data
Severity: Medium Confidence: High
CWE: CWE-79 (https://cwe.mitre.org/data/definitions/79.html)
Location: examples/flask_markup_xss.py:16:0
9
10 link = flask.Markup(user_input)

.. seealso::

- https://flask.palletsprojects.com/en/2.0.x/api/#flask.Markup

.. versionadded:: 1.7.5

"""
import bandit
from bandit.core import issue
from bandit.core import test_properties as test


def markup_usage(context):
if context.call_function_name_qual == "flask.Markup":
return True
return False


def markup_method_with_unescape(context):
"""
To flag flask.Markup.*().unescape()
"""
node = context.node
try:
if (
node.func.attr == "unescape"
and node.func.value.func.value.value.id == "flask"
and node.func.value.func.value.attr == "Markup"
):
return True
except AttributeError:
pass
return False


@test.checks("Call")
@test.test_id("B704")
def flask_markup_xss(context):
if markup_usage(context) or markup_method_with_unescape(context):
return bandit.Issue(
severity=bandit.MEDIUM,
confidence=bandit.HIGH,
cwe=issue.Cwe.XSS,
text="Potential XSS with ``flask.Markup``. Do "
"not use ``Markup`` or ``Markup.unescape`` "
"on untrusted data. Use ``Markup.escape`` to "
"escape untrusted data",
)
5 changes: 5 additions & 0 deletions doc/source/plugins/b704_flask_markup_xss.rst
@@ -0,0 +1,5 @@
----------------------
B704: flask_markup_xss
----------------------

.. automodule:: bandit.plugins.flask_markup_xss
19 changes: 19 additions & 0 deletions examples/flask_markup_xss.py
@@ -0,0 +1,19 @@
import flask
from flask import Markup

user_input = "<script>alert(1)</script>"

# True: flask.Markup usage
flask.Markup(user_input)

# True: flask.Markup.unescape
flask.Markup(user_input).unescape()

# True: flask.Markup.escape.unescape
flask.Markup.escape(user_input).unescape()

# False: flask.Markup.escape
flask.Markup.escape(user_input)

# False: Markup.escape
Markup.escape(user_input)
3 changes: 3 additions & 0 deletions setup.cfg
Expand Up @@ -140,6 +140,9 @@ bandit.plugins =
# bandit/plugins/logging_config_insecure_listen.py
logging_config_insecure_listen = bandit.plugins.logging_config_insecure_listen:logging_config_insecure_listen

# bandit/plugins/flask_markup_xss.py
flask_markup_xss = bandit.plugins.flask_markup_xss:flask_markup_xss

[build_sphinx]
all_files = 1
build-dir = doc/build
Expand Down