Skip to content

Instantly share code, notes, and snippets.

@joeyespo
Last active May 5, 2017 04:56
Show Gist options
  • Star 2 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save joeyespo/9608305 to your computer and use it in GitHub Desktop.
Save joeyespo/9608305 to your computer and use it in GitHub Desktop.
Example XSS with the new `|tojson` behavior in Flask 0.10
from flask import Flask, render_template
app = Flask(__name__)
@app.route('/')
def index():
# Expected value
ids = [u"one", u"two's", u'"three"']
# Injected somehow
ids = ' onmouseover=alert(1) '
return render_template('index.html', ids=ids)
if __name__ == '__main__':
app.run(port=80, debug=True)
<html>
<head>
<title>Testing</title>
<style>
body {
background: white;
max-width: 768px;
margin: 24px auto 0;
}
.some-container-with-data {
background: #fafafa;
border: 1px solid #ccc;
padding: 8px 32px;
margin: 32px 0;
}
.some-other-container {
font-style: italic;
}
</style>
</head>
<body>
<h1>Testing</h1>
<div class="some-container-with-data" data-ids="{{ ids|tojson }}">
<p>
<strong>Hover over this box</strong> to see the unintended consequence of
using a seemingly safe mix of "|tojson" + standard double-quoted HTML attributes.
</p>
</div>
<div class="some-other-container">
<p>
Note that in a real application, "data-ids" is a clean and
unobtrusive way to pass data to an external script, all
without having any "wire-up" code in your HTML.
</p>
</div>
</body>
</html>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment