-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CRLF injection #1
Comments
Really it's header injection:
|
I believe the bug is in how we handle redirects. |
I put a
|
I'm finding four places outside of
|
Sorry, I misread "CRLF injection" in the title as "CSRF injection." |
For the test case above, we're hitting the second dispatcher redirect (to trailing slash). |
Okay! What's the best fix? |
Seems like a safe, low-level place to fix this bug would be in |
Or is now the time to migrate Aspen to Werkzeug? Cf. AspenWeb/pando.py#357. |
Hah! We already have The other limitation with our current implementation is that adding a second value for the same header doesn't go through |
Ping @pjz. |
@pjz I just added you to the Gratipay security team so you can help me land the fix for this. You available? :) |
Fixed in Aspen 0.39. |
Niiice. Did you find any real threats for CRLF injection in GP? |
Fix deployed in gratipay/gratipay.com#3588, but gratipay/gratipay.com#3594 is causing a 500. Still considering this fixed tho:
|
To: researcher
|
https://gratipay.freshdesk.com/helpdesk/tickets/2305
The text was updated successfully, but these errors were encountered: