mirror of
https://github.com/dgtlmoon/changedetection.io.git
synced 2026-04-29 22:37:09 +00:00
3d14df6a11
Multi-language / Translations Support (#3696) - Complete internationalization system implemented - Support for 7 languages: Czech (cs), German (de), French (fr), Italian (it), Korean (ko), Chinese Simplified (zh), Chinese Traditional (zh_TW) - Language selector with localized flags and theming - Flash message translations - Multiple translation fixes and improvements across all languages - Language setting preserved across redirects Pluggable Content Fetchers (#3653) - New architecture for extensible content fetcher system - Allows custom fetcher implementations Image / Screenshot Comparison Processor (#3680) - New processor for visual change detection (disabled for this release) - Supporting CSS/JS infrastructure added UI Improvements Design & Layout - Auto-generated tag color schemes - Simplified login form styling - Removed hard-coded CSS, moved to SCSS variables - Tag UI cleanup and improvements - Automatic tab wrapper functionality - Menu refactoring for better organization - Cleanup of offset settings - Hide sticky tabs on narrow viewports - Improved responsive layout (#3702) User Experience - Modal alerts/confirmations on delete/clear operations (#3693, #3598, #3382) - Auto-add https:// to URLs in quickwatch form if not present - Better redirect handling on login (#3699) - 'Recheck all' now returns to correct group/tag (#3673) - Language set redirect keeps hash fragment - More friendly human-readable text throughout UI Performance & Reliability Scheduler & Processing - Soft delays instead of blocking time.sleep() calls (#3710) - More resilient handling of same UUID being processed (#3700) - Better Puppeteer timeout handling - Improved Puppeteer shutdown/cleanup (#3692) - Requests cleanup now properly async History & Rendering - Faster server-side "difference" rendering on History page (#3442) - Show ignored/triggered rows in history - API: Retry watch data if watch dict changed (more reliable) API Improvements - Watch get endpoint: retry mechanism for changed watch data - WatchHistoryDiff API endpoint includes extra format args (#3703) Testing Improvements - Replace time.sleep with wait_for_notification_endpoint_output (#3716) - Test for mode switching (#3701) - Test for #3720 added (#3725) - Extract-text difference test fixes - Improved dev workflow Bug Fixes - Notification error text output (#3672, #3669, #3280) - HTML validation fixes (#3704) - Template discovery path fixes - Notification debug log now uses system locale for dates/times - Puppeteer spelling mistake in log output - Recalculation on anchor change - Queue bubble update disabled temporarily Dependency Updates - beautifulsoup4 updated (#3724) - psutil 7.1.0 → 7.2.1 (#3723) - python-engineio ~=4.12.3 → ~=4.13.0 (#3707) - python-socketio ~=5.14.3 → ~=5.16.0 (#3706) - flask-socketio ~=5.5.1 → ~=5.6.0 (#3691) - brotli ~=1.1 → ~=1.2 (#3687) - lxml updated (#3590) - pytest ~=7.2 → ~=9.0 (#3676) - jsonschema ~=4.0 → ~=4.25 (#3618) - pluggy ~=1.5 → ~=1.6 (#3616) - cryptography 44.0.1 → 46.0.3 (security) (#3589) Documentation - README updated with viewport size setup information Development Infrastructure - Dev container only built on dev branch - Improved dev workflow tooling
114 lines
4.4 KiB
Python
114 lines
4.4 KiB
Python
"""
|
|
URL redirect validation module for preventing open redirect vulnerabilities.
|
|
|
|
This module provides functionality to safely validate redirect URLs, ensuring they:
|
|
1. Point to internal routes only (no external redirects)
|
|
2. Are properly normalized (preventing browser parsing differences)
|
|
3. Match registered Flask routes (no fake/non-existent pages)
|
|
4. Are fully logged for security monitoring
|
|
|
|
References:
|
|
- https://flask-login.readthedocs.io/ (safe redirect patterns)
|
|
- https://blog.miguelgrinberg.com/post/the-flask-mega-tutorial-part-v-user-logins
|
|
- https://www.pythonkitchen.com/how-prevent-open-redirect-vulnerab-flask/
|
|
"""
|
|
|
|
from urllib.parse import urlparse, urljoin
|
|
from flask import request
|
|
from loguru import logger
|
|
|
|
|
|
def is_safe_url(target, app):
|
|
"""
|
|
Validate that a redirect URL is safe to prevent open redirect vulnerabilities.
|
|
|
|
This follows Flask/Werkzeug best practices by ensuring the redirect URL:
|
|
1. Is a relative path starting with exactly one '/'
|
|
2. Does not start with '//' (double-slash attack)
|
|
3. Has no external protocol handlers
|
|
4. Points to a valid registered route in the application
|
|
5. Is properly normalized to prevent browser parsing differences
|
|
|
|
Args:
|
|
target: The URL to validate (e.g., '/settings', '/login#top')
|
|
app: The Flask application instance (needed for route validation)
|
|
|
|
Returns:
|
|
bool: True if the URL is safe for redirection, False otherwise
|
|
|
|
Examples:
|
|
>>> is_safe_url('/settings', app)
|
|
True
|
|
>>> is_safe_url('//evil.com', app)
|
|
False
|
|
>>> is_safe_url('/settings#general', app)
|
|
True
|
|
>>> is_safe_url('/fake-page', app)
|
|
False
|
|
"""
|
|
if not target:
|
|
return False
|
|
|
|
# Normalize the URL to prevent browser parsing differences
|
|
# Strip whitespace and replace backslashes (which some browsers interpret as forward slashes)
|
|
target = target.strip()
|
|
target = target.replace('\\', '/')
|
|
|
|
# First, check if it starts with // or more (double-slash attack)
|
|
if target.startswith('//'):
|
|
logger.warning(f"Blocked redirect attempt with double-slash: {target}")
|
|
return False
|
|
|
|
# Parse the URL to check for scheme and netloc
|
|
parsed = urlparse(target)
|
|
|
|
# Block any URL with a scheme (http://, https://, javascript:, etc.)
|
|
if parsed.scheme:
|
|
logger.warning(f"Blocked redirect attempt with scheme: {target}")
|
|
return False
|
|
|
|
# Block any URL with a network location (netloc)
|
|
# This catches patterns like //evil.com, user@host, etc.
|
|
if parsed.netloc:
|
|
logger.warning(f"Blocked redirect attempt with netloc: {target}")
|
|
return False
|
|
|
|
# At this point, we have a relative URL with no scheme or netloc
|
|
# Use urljoin to resolve it and verify it points to the same host
|
|
ref_url = urlparse(request.host_url)
|
|
test_url = urlparse(urljoin(request.host_url, target))
|
|
|
|
# Check: ensure the resolved URL has the same netloc as current host
|
|
if not (test_url.scheme in ('http', 'https') and ref_url.netloc == test_url.netloc):
|
|
logger.warning(f"Blocked redirect attempt with mismatched netloc: {target}")
|
|
return False
|
|
|
|
# Additional validation: Check if the URL matches a registered route
|
|
# This prevents redirects to non-existent pages or unintended endpoints
|
|
try:
|
|
# Get the path without query string and fragment
|
|
# Fragments (like #general) are automatically stripped by urlparse
|
|
path = parsed.path
|
|
|
|
# Create a URL adapter bound to the server name
|
|
adapter = app.url_map.bind(ref_url.netloc)
|
|
|
|
# Try to match the path to a registered route
|
|
# This will raise NotFound if the route doesn't exist
|
|
endpoint, values = adapter.match(path, return_rule=False)
|
|
|
|
# Block redirects to static file endpoints - these are catch-all routes
|
|
# that would match arbitrary paths, potentially allowing unintended redirects
|
|
if endpoint in ('static_content', 'static', 'static_flags'):
|
|
logger.warning(f"Blocked redirect to static endpoint: {target}")
|
|
return False
|
|
|
|
# Successfully matched a valid route
|
|
logger.debug(f"Validated safe redirect to endpoint '{endpoint}': {target}")
|
|
return True
|
|
|
|
except Exception as e:
|
|
# Route doesn't exist or can't be matched
|
|
logger.warning(f"Blocked redirect to non-existent route: {target} (error: {e})")
|
|
return False
|