fixed XSS attack on pathway description and on scenario additional information fields. #72

This commit is contained in:
Liam Brydon
2025-10-15 15:11:54 +13:00
parent 17744294cc
commit 8d955d685c

View File

@ -58,6 +58,16 @@ def log_post_params(request):
logger.debug(f"{k}\t{v}") logger.debug(f"{k}\t{v}")
def sanitize_dict(bad_dict):
"""Check each value in a dictionary for XSS attempts"""
clean_dict = {} # TODO: I'm not sure if this is the best way to do this.
for key, value in bad_dict.items():
if key != 'csrfmiddlewaretoken' and isinstance(value, str):
value = nh3.clean(value, tags=s.ALLOWED_HTML_TAGS)
clean_dict[key] = value
return clean_dict
def error(request, message: str, detail: str, code: int = 400): def error(request, message: str, detail: str, code: int = 400):
context = get_base_context(request) context = get_base_context(request)
error_context = { error_context = {
@ -391,6 +401,7 @@ def packages(request):
return HttpResponseBadRequest() return HttpResponseBadRequest()
else: else:
package_name = request.POST.get("package-name") package_name = request.POST.get("package-name")
# Sanitize for potential XSS
package_description = nh3.clean(request.POST.get( package_description = nh3.clean(request.POST.get(
"package-description", s.DEFAULT_VALUES["description"] "package-description", s.DEFAULT_VALUES["description"]
), tags=s.ALLOWED_HTML_TAGS) ), tags=s.ALLOWED_HTML_TAGS)
@ -1020,6 +1031,7 @@ def package(request, package_uuid):
return HttpResponseBadRequest() return HttpResponseBadRequest()
new_package_name = request.POST.get("package-name") new_package_name = request.POST.get("package-name")
# Sanitize for potential XSS
new_package_description = nh3.clean(request.POST.get("package-description"), tags=s.ALLOWED_HTML_TAGS) new_package_description = nh3.clean(request.POST.get("package-description"), tags=s.ALLOWED_HTML_TAGS)
grantee_url = request.POST.get("grantee") grantee_url = request.POST.get("grantee")
@ -1713,7 +1725,8 @@ def package_pathways(request, package_uuid):
log_post_params(request) log_post_params(request)
name = request.POST.get("name") name = request.POST.get("name")
description = request.POST.get("description") # Sanitize for potential XSS
description = nh3.clean(request.POST.get("description"), tags=s.ALLOWED_HTML_TAGS)
pw_mode = request.POST.get("predict", "predict").strip() pw_mode = request.POST.get("predict", "predict").strip()
smiles = request.POST.get("smiles", "").strip() smiles = request.POST.get("smiles", "").strip()
@ -1866,7 +1879,8 @@ def package_pathway(request, package_uuid, pathway_uuid):
return JsonResponse({"success": current_pathway.url}) return JsonResponse({"success": current_pathway.url})
pathway_name = request.POST.get("pathway-name") pathway_name = request.POST.get("pathway-name")
pathway_description = request.POST.get("pathway-description") # Sanitize for potential XSS
pathway_description = nh3.clean(request.POST.get("pathway-description"), tags=s.ALLOWED_HTML_TAGS)
if any([pathway_name, pathway_description]): if any([pathway_name, pathway_description]):
if pathway_name is not None and pathway_name.strip() != "": if pathway_name is not None and pathway_name.strip() != "":
@ -2327,7 +2341,8 @@ def package_scenario(request, package_uuid, scenario_uuid):
current_scenario.save() current_scenario.save()
return redirect(current_scenario.url) return redirect(current_scenario.url)
elif hidden == "set-additional-information": elif hidden == "set-additional-information":
ais = HTMLGenerator.build_models(request.POST.dict()) post_dict = sanitize_dict(request.POST.dict()) # Sanitise post dict inputs for potential XSS
ais = HTMLGenerator.build_models(post_dict)
if s.DEBUG: if s.DEBUG:
logger.info(ais) logger.info(ais)
@ -2335,7 +2350,8 @@ def package_scenario(request, package_uuid, scenario_uuid):
current_scenario.set_additional_information(ais) current_scenario.set_additional_information(ais)
return redirect(current_scenario.url) return redirect(current_scenario.url)
elif hidden == "add-additional-information": elif hidden == "add-additional-information":
ais = HTMLGenerator.build_models(request.POST.dict()) post_dict = sanitize_dict(request.POST.dict()) # Sanitise post dict inputs for potential XSS
ais = HTMLGenerator.build_models(post_dict)
if len(ais.keys()) != 1: if len(ais.keys()) != 1:
raise ValueError( raise ValueError(