mirror of
				https://github.com/django/django.git
				synced 2025-10-31 09:41:08 +00:00 
			
		
		
		
	Fixed a security issue in get_host.
Full disclosure and new release forthcoming.
This commit is contained in:
		| @@ -25,6 +25,7 @@ from django.utils.encoding import force_bytes, force_text, force_str, iri_to_uri | ||||
|  | ||||
| RAISE_ERROR = object() | ||||
| absolute_http_url_re = re.compile(r"^https?://", re.I) | ||||
| host_validation_re = re.compile(r"^([a-z0-9.-]+|\[[a-f0-9]*:[a-f0-9:]+\])(:\d+)?$") | ||||
|  | ||||
|  | ||||
| class UnreadablePostError(IOError): | ||||
| @@ -64,7 +65,7 @@ class HttpRequest(object): | ||||
|                 host = '%s:%s' % (host, server_port) | ||||
|  | ||||
|         # Disallow potentially poisoned hostnames. | ||||
|         if set(';/?@&=+$,').intersection(host): | ||||
|         if not host_validation_re.match(host.lower()): | ||||
|             raise SuspiciousOperation('Invalid HTTP_HOST header: %s' % host) | ||||
|  | ||||
|         return host | ||||
|   | ||||
		Reference in New Issue
	
	Block a user