This package contains a django template parser that can be used to find templates that contain variables that will not be escaped.
Project description
# django xss detection
This package contains a django template parser that can be used to find templates
that contain variables that will not be escaped. This package currently has
no knowledge of custom filters, custom tags, and python code (e.g. uses of
mark safe). The code has only been tested against django versions >= 1.5 and <= 1.7.
## Requirements
* django >= 1.5 and < 1.8
* lxml
## Usage
This package can be used on the command line by running
> `python -m django_xss_detection.cli`
## How does it work?
The code works by monkey patching django template code and providing through
a callback function to VariableNode that ends up referring to the
`CompileStringWrapper.handle_callback` method. The callback function is used
later when the code `renders` a given template and encounters a variable node
that will not be escaped. The implementation of detecting unquoted variable nodes
in element attributes and variable nodes in a javascript context lacking
javascript escaping are not implemented through callbacks, see
`get_non_quoted_attr_vars_for_template` and
`get_non_js_escaped_results_for_template` in parse_template.py respectively.
Additionally, the code has modified versions of built in conditional tags,
such as `{% if %}` and `{% ifequal %}`, so as to `render` all possible template
code. If this package does not work on your custom template tags then
you can add support for them similar to how `waffle` template tags are
implemented (see `templatetags/waffle.py` and the `patch` method in `util.py`).
This package contains a django template parser that can be used to find templates
that contain variables that will not be escaped. This package currently has
no knowledge of custom filters, custom tags, and python code (e.g. uses of
mark safe). The code has only been tested against django versions >= 1.5 and <= 1.7.
## Requirements
* django >= 1.5 and < 1.8
* lxml
## Usage
This package can be used on the command line by running
> `python -m django_xss_detection.cli`
## How does it work?
The code works by monkey patching django template code and providing through
a callback function to VariableNode that ends up referring to the
`CompileStringWrapper.handle_callback` method. The callback function is used
later when the code `renders` a given template and encounters a variable node
that will not be escaped. The implementation of detecting unquoted variable nodes
in element attributes and variable nodes in a javascript context lacking
javascript escaping are not implemented through callbacks, see
`get_non_quoted_attr_vars_for_template` and
`get_non_js_escaped_results_for_template` in parse_template.py respectively.
Additionally, the code has modified versions of built in conditional tags,
such as `{% if %}` and `{% ifequal %}`, so as to `render` all possible template
code. If this package does not work on your custom template tags then
you can add support for them similar to how `waffle` template tags are
implemented (see `templatetags/waffle.py` and the `patch` method in `util.py`).
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file django-xss-detection-0.4.17.tar.gz
.
File metadata
- Download URL: django-xss-detection-0.4.17.tar.gz
- Upload date:
- Size: 11.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 2405953534fa3e73c22e8d93def5f7c6e37839076b38ef527144aa4f6bf49298 |
|
MD5 | 426c80d958bfffc7f0401c1ae61083e8 |
|
BLAKE2b-256 | 952d707b9414f40492800a22fef2f5171c556c87de39f4927781c400d8501dcf |