| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 1 | # -*- coding: utf-8 -*- |
| 2 | """ |
| 3 | jinja2.testsuite.security |
| 4 | ~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 5 | |
| 6 | Checks the sandbox and other security features. |
| 7 | |
| 8 | :copyright: (c) 2010 by the Jinja Team. |
| 9 | :license: BSD, see LICENSE for more details. |
| 10 | """ |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 11 | import pytest |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 12 | |
| 13 | from jinja2 import Environment |
| 14 | from jinja2.sandbox import SandboxedEnvironment, \ |
| Armin Ronacher | 9b53045 | 2016-12-29 14:13:38 +0100 | [diff] [blame] | 15 | ImmutableSandboxedEnvironment, unsafe, has_format |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 16 | from jinja2 import Markup, escape |
| Armin Ronacher | a919538 | 2010-11-29 13:21:57 +0100 | [diff] [blame] | 17 | from jinja2.exceptions import SecurityError, TemplateSyntaxError, \ |
| 18 | TemplateRuntimeError |
| Armin Ronacher | 444fec3 | 2013-05-19 14:22:08 +0100 | [diff] [blame] | 19 | from jinja2._compat import text_type |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 20 | |
| 21 | |
| 22 | class PrivateStuff(object): |
| 23 | |
| 24 | def bar(self): |
| 25 | return 23 |
| 26 | |
| 27 | @unsafe |
| 28 | def foo(self): |
| 29 | return 42 |
| 30 | |
| 31 | def __repr__(self): |
| 32 | return 'PrivateStuff' |
| 33 | |
| 34 | |
| 35 | class PublicStuff(object): |
| 36 | bar = lambda self: 23 |
| 37 | _foo = lambda self: 42 |
| 38 | |
| 39 | def __repr__(self): |
| 40 | return 'PublicStuff' |
| 41 | |
| 42 | |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 43 | @pytest.mark.sandbox |
| 44 | class TestSandbox(): |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 45 | |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 46 | def test_unsafe(self, env): |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 47 | env = SandboxedEnvironment() |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 48 | pytest.raises(SecurityError, env.from_string("{{ foo.foo() }}").render, |
| 49 | foo=PrivateStuff()) |
| 50 | assert env.from_string("{{ foo.bar() }}").render(foo=PrivateStuff()) == '23' |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 51 | |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 52 | pytest.raises(SecurityError, |
| 53 | env.from_string("{{ foo._foo() }}").render, |
| 54 | foo=PublicStuff()) |
| 55 | assert env.from_string("{{ foo.bar() }}").render(foo=PublicStuff()) == '23' |
| 56 | assert env.from_string("{{ foo.__class__ }}").render(foo=42) == '' |
| 57 | assert env.from_string("{{ foo.func_code }}").render(foo=lambda:None) == '' |
| Armin Ronacher | 6a3e95d | 2010-11-19 13:51:38 +0100 | [diff] [blame] | 58 | # security error comes from __class__ already. |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 59 | pytest.raises(SecurityError, env.from_string( |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 60 | "{{ foo.__class__.__subclasses__() }}").render, foo=42) |
| 61 | |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 62 | def test_immutable_environment(self, env): |
| Armin Ronacher | 1fb4269 | 2010-02-09 21:14:16 +0100 | [diff] [blame] | 63 | env = ImmutableSandboxedEnvironment() |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 64 | pytest.raises(SecurityError, env.from_string( |
| Armin Ronacher | 1fb4269 | 2010-02-09 21:14:16 +0100 | [diff] [blame] | 65 | '{{ [].append(23) }}').render) |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 66 | pytest.raises(SecurityError, env.from_string( |
| Armin Ronacher | 1fb4269 | 2010-02-09 21:14:16 +0100 | [diff] [blame] | 67 | '{{ {1:2}.clear() }}').render) |
| 68 | |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 69 | def test_restricted(self, env): |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 70 | env = SandboxedEnvironment() |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 71 | pytest.raises(TemplateSyntaxError, env.from_string, |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 72 | "{% for item.attribute in seq %}...{% endfor %}") |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 73 | pytest.raises(TemplateSyntaxError, env.from_string, |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 74 | "{% for foo, bar.baz in seq %}...{% endfor %}") |
| 75 | |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 76 | def test_markup_operations(self, env): |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 77 | # adding two strings should escape the unsafe one |
| 78 | unsafe = '<script type="application/x-some-script">alert("foo");</script>' |
| 79 | safe = Markup('<em>username</em>') |
| Armin Ronacher | 444fec3 | 2013-05-19 14:22:08 +0100 | [diff] [blame] | 80 | assert unsafe + safe == text_type(escape(unsafe)) + text_type(safe) |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 81 | |
| 82 | # string interpolations are safe to use too |
| 83 | assert Markup('<em>%s</em>') % '<bad user>' == \ |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 84 | '<em><bad user></em>' |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 85 | assert Markup('<em>%(username)s</em>') % { |
| 86 | 'username': '<bad user>' |
| 87 | } == '<em><bad user></em>' |
| 88 | |
| 89 | # an escaped object is markup too |
| 90 | assert type(Markup('foo') + 'bar') is Markup |
| 91 | |
| 92 | # and it implements __html__ by returning itself |
| 93 | x = Markup("foo") |
| 94 | assert x.__html__() is x |
| 95 | |
| 96 | # it also knows how to treat __html__ objects |
| 97 | class Foo(object): |
| 98 | def __html__(self): |
| 99 | return '<em>awesome</em>' |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 100 | |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 101 | def __unicode__(self): |
| 102 | return 'awesome' |
| 103 | assert Markup(Foo()) == '<em>awesome</em>' |
| 104 | assert Markup('<strong>%s</strong>') % Foo() == \ |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 105 | '<strong><em>awesome</em></strong>' |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 106 | |
| 107 | # escaping and unescaping |
| 108 | assert escape('"<>&\'') == '"<>&'' |
| 109 | assert Markup("<em>Foo & Bar</em>").striptags() == "Foo & Bar" |
| 110 | assert Markup("<test>").unescape() == "<test>" |
| 111 | |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 112 | def test_template_data(self, env): |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 113 | env = Environment(autoescape=True) |
| 114 | t = env.from_string('{% macro say_hello(name) %}' |
| 115 | '<p>Hello {{ name }}!</p>{% endmacro %}' |
| 116 | '{{ say_hello("<blink>foo</blink>") }}') |
| 117 | escaped_out = '<p>Hello <blink>foo</blink>!</p>' |
| 118 | assert t.render() == escaped_out |
| Armin Ronacher | 444fec3 | 2013-05-19 14:22:08 +0100 | [diff] [blame] | 119 | assert text_type(t.module) == escaped_out |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 120 | assert escape(t.module) == escaped_out |
| 121 | assert t.module.say_hello('<blink>foo</blink>') == escaped_out |
| 122 | assert escape(t.module.say_hello('<blink>foo</blink>')) == escaped_out |
| 123 | |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 124 | def test_attr_filter(self, env): |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 125 | env = SandboxedEnvironment() |
| Armin Ronacher | 6a3e95d | 2010-11-19 13:51:38 +0100 | [diff] [blame] | 126 | tmpl = env.from_string('{{ cls|attr("__subclasses__")() }}') |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 127 | pytest.raises(SecurityError, tmpl.render, cls=int) |
| Armin Ronacher | 644a281 | 2010-02-09 18:06:32 +0100 | [diff] [blame] | 128 | |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 129 | def test_binary_operator_intercepting(self, env): |
| Armin Ronacher | a919538 | 2010-11-29 13:21:57 +0100 | [diff] [blame] | 130 | def disable_op(left, right): |
| 131 | raise TemplateRuntimeError('that operator so does not work') |
| 132 | for expr, ctx, rv in ('1 + 2', {}, '3'), ('a + 2', {'a': 2}, '4'): |
| 133 | env = SandboxedEnvironment() |
| 134 | env.binop_table['+'] = disable_op |
| 135 | t = env.from_string('{{ %s }}' % expr) |
| 136 | assert t.render(ctx) == rv |
| 137 | env.intercepted_binops = frozenset(['+']) |
| 138 | t = env.from_string('{{ %s }}' % expr) |
| 139 | try: |
| 140 | t.render(ctx) |
| Thomas Waldmann | e000355 | 2013-05-17 23:52:14 +0200 | [diff] [blame] | 141 | except TemplateRuntimeError as e: |
| Armin Ronacher | a919538 | 2010-11-29 13:21:57 +0100 | [diff] [blame] | 142 | pass |
| 143 | else: |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 144 | assert False, 'expected runtime error' |
| Armin Ronacher | a919538 | 2010-11-29 13:21:57 +0100 | [diff] [blame] | 145 | |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 146 | def test_unary_operator_intercepting(self, env): |
| Armin Ronacher | a919538 | 2010-11-29 13:21:57 +0100 | [diff] [blame] | 147 | def disable_op(arg): |
| 148 | raise TemplateRuntimeError('that operator so does not work') |
| 149 | for expr, ctx, rv in ('-1', {}, '-1'), ('-a', {'a': 2}, '-2'): |
| 150 | env = SandboxedEnvironment() |
| 151 | env.unop_table['-'] = disable_op |
| 152 | t = env.from_string('{{ %s }}' % expr) |
| 153 | assert t.render(ctx) == rv |
| 154 | env.intercepted_unops = frozenset(['-']) |
| 155 | t = env.from_string('{{ %s }}' % expr) |
| 156 | try: |
| 157 | t.render(ctx) |
| Thomas Waldmann | e000355 | 2013-05-17 23:52:14 +0200 | [diff] [blame] | 158 | except TemplateRuntimeError as e: |
| Armin Ronacher | a919538 | 2010-11-29 13:21:57 +0100 | [diff] [blame] | 159 | pass |
| 160 | else: |
| Kartheek Lenkala | 9d4afa1 | 2015-03-22 15:28:54 +0530 | [diff] [blame] | 161 | assert False, 'expected runtime error' |
| Armin Ronacher | 9b53045 | 2016-12-29 14:13:38 +0100 | [diff] [blame] | 162 | |
| 163 | |
| 164 | @pytest.mark.sandbox |
| 165 | @pytest.mark.skipif(not has_format, reason='No format support') |
| 166 | class TestStringFormat(object): |
| 167 | |
| 168 | def test_basic_format_safety(self): |
| 169 | env = SandboxedEnvironment() |
| 170 | t = env.from_string('{{ "a{0.__class__}b".format(42) }}') |
| 171 | assert t.render() == 'ab' |
| 172 | |
| 173 | def test_basic_format_all_okay(self): |
| 174 | env = SandboxedEnvironment() |
| 175 | t = env.from_string('{{ "a{0.foo}b".format({"foo": 42}) }}') |
| 176 | assert t.render() == 'a42b' |
| 177 | |
| Miro Hrončok | ba7cba0 | 2016-12-29 14:28:38 +0100 | [diff] [blame] | 178 | def test_safe_format_safety(self): |
| Armin Ronacher | 9b53045 | 2016-12-29 14:13:38 +0100 | [diff] [blame] | 179 | env = SandboxedEnvironment() |
| 180 | t = env.from_string('{{ ("a{0.__class__}b{1}"|safe).format(42, "<foo>") }}') |
| 181 | assert t.render() == 'ab<foo>' |
| 182 | |
| Miro Hrončok | ba7cba0 | 2016-12-29 14:28:38 +0100 | [diff] [blame] | 183 | def test_safe_format_all_okay(self): |
| Armin Ronacher | 9b53045 | 2016-12-29 14:13:38 +0100 | [diff] [blame] | 184 | env = SandboxedEnvironment() |
| 185 | t = env.from_string('{{ ("a{0.foo}b{1}"|safe).format({"foo": 42}, "<foo>") }}') |
| 186 | assert t.render() == 'a42b<foo>' |