URL validator: accept user/password, use urllib.urlparse#847
URL validator: accept user/password, use urllib.urlparse#847ianw wants to merge 1 commit intopallets-eco:mainfrom
Conversation
I was hitting an issue in a build tool that was not letting me specify a URL to clone a git tree with a personal access token (e.g. [1]) in a wtform URL field. I started looking at expanding the original regex, but there are tricks like multiple "@"'s in passwords that are hard to get right. I think that for this purpose, urllib.urlparse (urlparse/urlsplit doesn't seem to matter here) will just "do the right thing". The test-cases are expanded with some coverage of username/passwords. [1] https://docs.gitlab.com/ee/user/profile/personal_access_tokens.html#clone-repository-using-personal-access-token
|
This absolutely needs to be opt-in. In most cases people do NOT want to accept such URLs. |
I think my concern with that would be the alternative case, where you have opted-out, then implies that the URL will be sanitised in some way. There's certainly been CVE level issues in things like So my counter argument would be to just not play that game at all -- have this as a RFC-level validator around URLs and leave security up to the app when it has what it knows is a valid url? |
|
I think I like having urllib doing the work instead of custom regexes. @ThiefMaster, what issues do you anticipate here? |
|
If you let (untrusted) users specify URLs containing Depending on the context and there the URL ends up, it could be used to trick users into clicking a nasty link thinking it points them to a trustworthy site. |
I was hitting an issue in a build tool that was not letting me specify a URL to clone a git tree with a personal access token (e.g. [1]) in a wtform URL field.
I started looking at expanding the original regex, but there are tricks like multiple "@"'s in passwords that are hard to get right. I think that for this purpose,
urllib.urlparse(urlparse/urlsplitdoesn't seem to matter here) will just "do the right thing".The test-cases are expanded with some coverage of username/passwords.
[1] https://docs.gitlab.com/ee/user/profile/personal_access_tokens.html#clone-repository-using-personal-access-token