On Fri, Sep 29, 2023 at 4:47 AM Shubham Kulkarni <skulka...@mvista.com> wrote:
>
> Hi Steve,
>
> Is there any update on this?

It is in my current test queue:

https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/dunfell-nut

Steve

> On Tue, Sep 26, 2023 at 9:38 AM Siddharth via lists.openembedded.org 
> <sdoshi=mvista....@lists.openembedded.org> wrote:
>>
>> From: Siddharth Doshi <sdo...@mvista.com>
>>
>> Upstream-Status: Backport from 
>> [https://github.com/golang/go/commit/023b542edf38e2a1f87fcefb9f75ff2f99401b4c]
>> CVE: CVE-2023-39318
>> Upstream-Status: Backport from 
>> [https://github.com/golang/go/commit/2070531d2f53df88e312edace6c8dfc9686ab2f5]
>> CVE: CVE-2023-39319
>> Signed-off-by: Siddharth Doshi <sdo...@mvista.com>
>> ---
>>  meta/recipes-devtools/go/go-1.14.inc          |   2 +
>>  .../go/go-1.14/CVE-2023-39318.patch           | 238 ++++++++++++++++++
>>  .../go/go-1.14/CVE-2023-39319.patch           | 230 +++++++++++++++++
>>  3 files changed, 470 insertions(+)
>>  create mode 100644 meta/recipes-devtools/go/go-1.14/CVE-2023-39318.patch
>>  create mode 100644 meta/recipes-devtools/go/go-1.14/CVE-2023-39319.patch
>>
>> diff --git a/meta/recipes-devtools/go/go-1.14.inc 
>> b/meta/recipes-devtools/go/go-1.14.inc
>> index 20377e095b..9fc5eb130f 100644
>> --- a/meta/recipes-devtools/go/go-1.14.inc
>> +++ b/meta/recipes-devtools/go/go-1.14.inc
>> @@ -70,6 +70,8 @@ SRC_URI += "\
>>      file://CVE-2023-29400.patch \
>>      file://CVE-2023-29406.patch \
>>      file://CVE-2023-29409.patch \
>> +    file://CVE-2023-39318.patch \
>> +    file://CVE-2023-39319.patch \
>>  "
>>
>>  SRC_URI_append_libc-musl = " 
>> file://0009-ld-replace-glibc-dynamic-linker-with-musl.patch"
>> diff --git a/meta/recipes-devtools/go/go-1.14/CVE-2023-39318.patch 
>> b/meta/recipes-devtools/go/go-1.14/CVE-2023-39318.patch
>> new file mode 100644
>> index 0000000000..20e70c0485
>> --- /dev/null
>> +++ b/meta/recipes-devtools/go/go-1.14/CVE-2023-39318.patch
>> @@ -0,0 +1,238 @@
>> +From 023b542edf38e2a1f87fcefb9f75ff2f99401b4c Mon Sep 17 00:00:00 2001
>> +From: Roland Shoemaker <bracew...@google.com>
>> +Date: Thu, 3 Aug 2023 12:24:13 -0700
>> +Subject: [PATCH] [release-branch.go1.20] html/template: support HTML-like
>> + comments in script contexts
>> +
>> +Per Appendix B.1.1 of the ECMAScript specification, support HTML-like
>> +comments in script contexts. Also per section 12.5, support hashbang
>> +comments. This brings our parsing in-line with how browsers treat these
>> +comment types.
>> +
>> +Thanks to Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.) for
>> +reporting this issue.
>> +
>> +Fixes #62196
>> +Fixes #62395
>> +Fixes CVE-2023-39318
>> +
>> +Change-Id: Id512702c5de3ae46cf648e268cb10e1eb392a181
>> +Reviewed-on: 
>> https://team-review.git.corp.google.com/c/golang/go-private/+/1976593
>> +Run-TryBot: Roland Shoemaker <bracew...@google.com>
>> +Reviewed-by: Tatiana Bradley <tatianabrad...@google.com>
>> +Reviewed-by: Damien Neil <dn...@google.com>
>> +Reviewed-by: Dmitri Shuralyov <dmits...@google.com>
>> +Reviewed-on: 
>> https://team-review.git.corp.google.com/c/golang/go-private/+/2014620
>> +Reviewed-on: https://go-review.googlesource.com/c/go/+/526098
>> +Run-TryBot: Cherry Mui <cherr...@google.com>
>> +TryBot-Result: Gopher Robot <go...@golang.org>
>> +
>> +Upstream-Status: Backport from 
>> [https://github.com/golang/go/commit/023b542edf38e2a1f87fcefb9f75ff2f99401b4c]
>> +CVE: CVE-2023-39318
>> +Signed-off-by: Siddharth Doshi <sdo...@mvista.com>
>> +---
>> + src/html/template/context.go      |  6 ++-
>> + src/html/template/escape.go       |  5 +-
>> + src/html/template/escape_test.go  | 10 ++++
>> + src/html/template/state_string.go |  4 +-
>> + src/html/template/transition.go   | 80 ++++++++++++++++++++-----------
>> + 5 files changed, 72 insertions(+), 33 deletions(-)
>> +
>> +diff --git a/src/html/template/context.go b/src/html/template/context.go
>> +index 0b65313..4eb7891 100644
>> +--- a/src/html/template/context.go
>> ++++ b/src/html/template/context.go
>> +@@ -124,6 +124,10 @@ const (
>> +       stateJSBlockCmt
>> +       // stateJSLineCmt occurs inside a JavaScript // line comment.
>> +       stateJSLineCmt
>> ++      // stateJSHTMLOpenCmt occurs inside a JavaScript <!-- HTML-like 
>> comment.
>> ++      stateJSHTMLOpenCmt
>> ++      // stateJSHTMLCloseCmt occurs inside a JavaScript --> HTML-like 
>> comment.
>> ++      stateJSHTMLCloseCmt
>> +       // stateCSS occurs inside a <style> element or style attribute.
>> +       stateCSS
>> +       // stateCSSDqStr occurs inside a CSS double quoted string.
>> +@@ -149,7 +153,7 @@ const (
>> + // authors & maintainers, not for end-users or machines.
>> + func isComment(s state) bool {
>> +       switch s {
>> +-      case stateHTMLCmt, stateJSBlockCmt, stateJSLineCmt, 
>> stateCSSBlockCmt, stateCSSLineCmt:
>> ++      case stateHTMLCmt, stateJSBlockCmt, stateJSLineCmt, 
>> stateJSHTMLOpenCmt, stateJSHTMLCloseCmt, stateCSSBlockCmt, stateCSSLineCmt:
>> +               return true
>> +       }
>> +       return false
>> +diff --git a/src/html/template/escape.go b/src/html/template/escape.go
>> +index 435f912..ad2ec69 100644
>> +--- a/src/html/template/escape.go
>> ++++ b/src/html/template/escape.go
>> +@@ -698,9 +698,12 @@ func (e *escaper) escapeText(c context, n 
>> *parse.TextNode) context {
>> +               if c.state != c1.state && isComment(c1.state) && c1.delim == 
>> delimNone {
>> +                       // Preserve the portion between written and the 
>> comment start.
>> +                       cs := i1 - 2
>> +-                      if c1.state == stateHTMLCmt {
>> ++                      if c1.state == stateHTMLCmt || c1.state == 
>> stateJSHTMLOpenCmt {
>> +                               // "<!--" instead of "/*" or "//"
>> +                               cs -= 2
>> ++                      } else if c1.state == stateJSHTMLCloseCmt {
>> ++                              // "-->" instead of "/*" or "//"
>> ++                              cs -= 1
>> +                       }
>> +                       b.Write(s[written:cs])
>> +                       written = i1
>> +diff --git a/src/html/template/escape_test.go 
>> b/src/html/template/escape_test.go
>> +index f550691..5f41e52 100644
>> +--- a/src/html/template/escape_test.go
>> ++++ b/src/html/template/escape_test.go
>> +@@ -503,6 +503,16 @@ func TestEscape(t *testing.T) {
>> +                       "<script>var a/*b*///c\nd</script>",
>> +                       "<script>var a \nd</script>",
>> +               },
>> ++              {
>> ++                      "JS HTML-like comments",
>> ++                      "<script>before <!-- 
>> beep\nbetween\nbefore-->boop\n</script>",
>> ++                      "<script>before \nbetween\nbefore\n</script>",
>> ++              },
>> ++              {
>> ++                      "JS hashbang comment",
>> ++                      "<script>#! beep\n</script>",
>> ++                      "<script>\n</script>",
>> ++              },
>> +               {
>> +                       "CSS comments",
>> +                       "<style>p// paragraph\n" +
>> +diff --git a/src/html/template/state_string.go 
>> b/src/html/template/state_string.go
>> +index 05104be..b5cfe70 100644
>> +--- a/src/html/template/state_string.go
>> ++++ b/src/html/template/state_string.go
>> +@@ -4,9 +4,9 @@ package template
>> +
>> + import "strconv"
>> +
>> +-const _state_name = 
>> "stateTextstateTagstateAttrNamestateAfterNamestateBeforeValuestateHTMLCmtstateRCDATAstateAttrstateURLstateSrcsetstateJSstateJSDqStrstateJSSqStrstateJSRegexpstateJSBlockCmtstateJSLineCmtstateCSSstateCSSDqStrstateCSSSqStrstateCSSDqURLstateCSSSqURLstateCSSURLstateCSSBlockCmtstateCSSLineCmtstateError"
>> ++const _state_name = 
>> "stateTextstateTagstateAttrNamestateAfterNamestateBeforeValuestateHTMLCmtstateRCDATAstateAttrstateURLstateSrcsetstateJSstateJSDqStrstateJSSqStrstateJSBqStrstateJSRegexpstateJSBlockCmtstateJSLineCmtstateJSHTMLOpenCmtstateJSHTMLCloseCmtstateCSSstateCSSDqStrstateCSSSqStrstateCSSDqURLstateCSSSqURLstateCSSURLstateCSSBlockCmtstateCSSLineCmtstateErrorstateDead"
>> +
>> +-var _state_index = [...]uint16{0, 9, 17, 30, 44, 60, 72, 83, 92, 100, 111, 
>> 118, 130, 142, 155, 170, 184, 192, 205, 218, 231, 244, 255, 271, 286, 296}
>> ++var _state_index = [...]uint16{0, 9, 17, 30, 44, 60, 72, 83, 92, 100, 111, 
>> 118, 130, 142, 154, 167, 182, 196, 214, 233, 241, 254, 267, 280, 293, 304, 
>> 320, 335, 345, 354}
>> +
>> + func (i state) String() string {
>> +       if i >= state(len(_state_index)-1) {
>> +diff --git a/src/html/template/transition.go 
>> b/src/html/template/transition.go
>> +index 92eb351..12aa4c4 100644
>> +--- a/src/html/template/transition.go
>> ++++ b/src/html/template/transition.go
>> +@@ -14,32 +14,34 @@ import (
>> + // the updated context and the number of bytes consumed from the front of 
>> the
>> + // input.
>> + var transitionFunc = [...]func(context, []byte) (context, int){
>> +-      stateText:        tText,
>> +-      stateTag:         tTag,
>> +-      stateAttrName:    tAttrName,
>> +-      stateAfterName:   tAfterName,
>> +-      stateBeforeValue: tBeforeValue,
>> +-      stateHTMLCmt:     tHTMLCmt,
>> +-      stateRCDATA:      tSpecialTagEnd,
>> +-      stateAttr:        tAttr,
>> +-      stateURL:         tURL,
>> +-      stateSrcset:      tURL,
>> +-      stateJS:          tJS,
>> +-      stateJSDqStr:     tJSDelimited,
>> +-      stateJSSqStr:     tJSDelimited,
>> +-      stateJSBqStr:     tJSDelimited,
>> +-      stateJSRegexp:    tJSDelimited,
>> +-      stateJSBlockCmt:  tBlockCmt,
>> +-      stateJSLineCmt:   tLineCmt,
>> +-      stateCSS:         tCSS,
>> +-      stateCSSDqStr:    tCSSStr,
>> +-      stateCSSSqStr:    tCSSStr,
>> +-      stateCSSDqURL:    tCSSStr,
>> +-      stateCSSSqURL:    tCSSStr,
>> +-      stateCSSURL:      tCSSStr,
>> +-      stateCSSBlockCmt: tBlockCmt,
>> +-      stateCSSLineCmt:  tLineCmt,
>> +-      stateError:       tError,
>> ++      stateText:           tText,
>> ++      stateTag:            tTag,
>> ++      stateAttrName:       tAttrName,
>> ++      stateAfterName:      tAfterName,
>> ++      stateBeforeValue:    tBeforeValue,
>> ++      stateHTMLCmt:        tHTMLCmt,
>> ++      stateRCDATA:         tSpecialTagEnd,
>> ++      stateAttr:           tAttr,
>> ++      stateURL:            tURL,
>> ++      stateSrcset:         tURL,
>> ++      stateJS:             tJS,
>> ++      stateJSDqStr:        tJSDelimited,
>> ++      stateJSSqStr:        tJSDelimited,
>> ++      stateJSBqStr:        tJSDelimited,
>> ++      stateJSRegexp:       tJSDelimited,
>> ++      stateJSBlockCmt:     tBlockCmt,
>> ++      stateJSLineCmt:      tLineCmt,
>> ++      stateJSHTMLOpenCmt:  tLineCmt,
>> ++      stateJSHTMLCloseCmt: tLineCmt,
>> ++      stateCSS:            tCSS,
>> ++      stateCSSDqStr:       tCSSStr,
>> ++      stateCSSSqStr:       tCSSStr,
>> ++      stateCSSDqURL:       tCSSStr,
>> ++      stateCSSSqURL:       tCSSStr,
>> ++      stateCSSURL:         tCSSStr,
>> ++      stateCSSBlockCmt:    tBlockCmt,
>> ++      stateCSSLineCmt:     tLineCmt,
>> ++      stateError:          tError,
>> + }
>> +
>> + var commentStart = []byte("<!--")
>> +@@ -263,7 +265,7 @@ func tURL(c context, s []byte) (context, int) {
>> +
>> + // tJS is the context transition function for the JS state.
>> + func tJS(c context, s []byte) (context, int) {
>> +-      i := bytes.IndexAny(s, "\"`'/")
>> ++      i := bytes.IndexAny(s, "\"`'/<-#")
>> +       if i == -1 {
>> +               // Entire input is non string, comment, regexp tokens.
>> +               c.jsCtx = nextJSCtx(s, c.jsCtx)
>> +@@ -293,6 +295,26 @@ func tJS(c context, s []byte) (context, int) {
>> +                               err:   errorf(ErrSlashAmbig, nil, 0, "'/' 
>> could start a division or regexp: %.32q", s[i:]),
>> +                       }, len(s)
>> +               }
>> ++      // ECMAScript supports HTML style comments for legacy reasons, see 
>> Appendix
>> ++      // B.1.1 "HTML-like Comments". The handling of these comments is 
>> somewhat
>> ++      // confusing. Multi-line comments are not supported, i.e. anything 
>> on lines
>> ++      // between the opening and closing tokens is not considered a 
>> comment, but
>> ++      // anything following the opening or closing token, on the same 
>> line, is
>> ++      // ignored. As such we simply treat any line prefixed with "<!--" or 
>> "-->"
>> ++      // as if it were actually prefixed with "//" and move on.
>> ++      case '<':
>> ++              if i+3 < len(s) && bytes.Equal(commentStart, s[i:i+4]) {
>> ++                      c.state, i = stateJSHTMLOpenCmt, i+3
>> ++              }
>> ++      case '-':
>> ++              if i+2 < len(s) && bytes.Equal(commentEnd, s[i:i+3]) {
>> ++                      c.state, i = stateJSHTMLCloseCmt, i+2
>> ++              }
>> ++      // ECMAScript also supports "hashbang" comment lines, see Section 
>> 12.5.
>> ++      case '#':
>> ++              if i+1 < len(s) && s[i+1] == '!' {
>> ++                      c.state, i = stateJSLineCmt, i+1
>> ++              }
>> +       default:
>> +               panic("unreachable")
>> +       }
>> +@@ -372,12 +394,12 @@ func tBlockCmt(c context, s []byte) (context, int) {
>> +       return c, i + 2
>> + }
>> +
>> +-// tLineCmt is the context transition function for //comment states.
>> ++// tLineCmt is the context transition function for //comment states, and 
>> the JS HTML-like comment state.
>> + func tLineCmt(c context, s []byte) (context, int) {
>> +       var lineTerminators string
>> +       var endState state
>> +       switch c.state {
>> +-      case stateJSLineCmt:
>> ++      case stateJSLineCmt, stateJSHTMLOpenCmt, stateJSHTMLCloseCmt:
>> +               lineTerminators, endState = "\n\r\u2028\u2029", stateJS
>> +       case stateCSSLineCmt:
>> +               lineTerminators, endState = "\n\f\r", stateCSS
>> +--
>> +2.24.4
>> +
>> diff --git a/meta/recipes-devtools/go/go-1.14/CVE-2023-39319.patch 
>> b/meta/recipes-devtools/go/go-1.14/CVE-2023-39319.patch
>> new file mode 100644
>> index 0000000000..69106e3e05
>> --- /dev/null
>> +++ b/meta/recipes-devtools/go/go-1.14/CVE-2023-39319.patch
>> @@ -0,0 +1,230 @@
>> +From 2070531d2f53df88e312edace6c8dfc9686ab2f5 Mon Sep 17 00:00:00 2001
>> +From: Roland Shoemaker <bracew...@google.com>
>> +Date: Thu, 3 Aug 2023 12:28:28 -0700
>> +Subject: [PATCH] [release-branch.go1.20] html/template: properly handle
>> + special tags within the script context
>> +
>> +The HTML specification has incredibly complex rules for how to handle
>> +"<!--", "<script", and "</script" when they appear within literals in
>> +the script context. Rather than attempting to apply these restrictions
>> +(which require a significantly more complex state machine) we apply
>> +the workaround suggested in section 4.12.1.3 of the HTML specification [1].
>> +
>> +More precisely, when "<!--", "<script", and "</script" appear within
>> +literals (strings and regular expressions, ignoring comments since we
>> +already elide their content) we replace the "<" with "\x3C". This avoids
>> +the unintuitive behavior that using these tags within literals can cause,
>> +by simply preventing the rendered content from triggering it. This may
>> +break some correct usages of these tags, but on balance is more likely
>> +to prevent XSS attacks where users are unknowingly either closing or not
>> +closing the script blocks where they think they are.
>> +
>> +Thanks to Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.) for
>> +reporting this issue.
>> +
>> +Fixes #62197
>> +Fixes #62397
>> +Fixes CVE-2023-39319
>> +
>> +[1] 
>> https://html.spec.whatwg.org/#restrictions-for-contents-of-script-elements
>> +
>> +Change-Id: Iab57b0532694827e3eddf57a7497ba1fab1746dc
>> +Reviewed-on: 
>> https://team-review.git.corp.google.com/c/golang/go-private/+/1976594
>> +Reviewed-by: Dmitri Shuralyov <dmits...@google.com>
>> +Reviewed-by: Tatiana Bradley <tatianabrad...@google.com>
>> +Reviewed-by: Damien Neil <dn...@google.com>
>> +Run-TryBot: Roland Shoemaker <bracew...@google.com>
>> +Reviewed-on: 
>> https://team-review.git.corp.google.com/c/golang/go-private/+/2014621
>> +TryBot-Result: Security TryBots 
>> <security-tryb...@go-security-trybots.iam.gserviceaccount.com>
>> +Reviewed-on: https://go-review.googlesource.com/c/go/+/526099
>> +TryBot-Result: Gopher Robot <go...@golang.org>
>> +Run-TryBot: Cherry Mui <cherr...@google.com>
>> +
>> +Upstream-Status: Backport from 
>> [https://github.com/golang/go/commit/2070531d2f53df88e312edace6c8dfc9686ab2f5]
>> +CVE: CVE-2023-39319
>> +Signed-off-by: Siddharth Doshi <sdo...@mvista.com>
>> +---
>> + src/html/template/context.go     | 14 ++++++++++
>> + src/html/template/escape.go      | 26 ++++++++++++++++++
>> + src/html/template/escape_test.go | 47 +++++++++++++++++++++++++++++++-
>> + src/html/template/transition.go  | 15 ++++++++++
>> + 4 files changed, 101 insertions(+), 1 deletion(-)
>> +
>> +diff --git a/src/html/template/context.go b/src/html/template/context.go
>> +index 4eb7891..feb6517 100644
>> +--- a/src/html/template/context.go
>> ++++ b/src/html/template/context.go
>> +@@ -168,6 +168,20 @@ func isInTag(s state) bool {
>> +       return false
>> + }
>> +
>> ++// isInScriptLiteral returns true if s is one of the literal states within 
>> a
>> ++// <script> tag, and as such occurances of "<!--", "<script", and 
>> "</script"
>> ++// need to be treated specially.
>> ++func isInScriptLiteral(s state) bool {
>> ++      // Ignore the comment states (stateJSBlockCmt, stateJSLineCmt,
>> ++      // stateJSHTMLOpenCmt, stateJSHTMLCloseCmt) because their content is 
>> already
>> ++      // omitted from the output.
>> ++      switch s {
>> ++      case stateJSDqStr, stateJSSqStr, stateJSBqStr, stateJSRegexp:
>> ++              return true
>> ++      }
>> ++      return false
>> ++}
>> ++
>> + // delim is the delimiter that will end the current HTML attribute.
>> + type delim uint8
>> +
>> +diff --git a/src/html/template/escape.go b/src/html/template/escape.go
>> +index ad2ec69..de8cf6f 100644
>> +--- a/src/html/template/escape.go
>> ++++ b/src/html/template/escape.go
>> +@@ -10,6 +10,7 @@ import (
>> +       "html"
>> +       "internal/godebug"
>> +       "io"
>> ++      "regexp"
>> +       "text/template"
>> +       "text/template/parse"
>> + )
>> +@@ -650,6 +651,26 @@ var delimEnds = [...]string{
>> +       delimSpaceOrTagEnd: " \t\n\f\r>",
>> + }
>> +
>> ++var (
>> ++      // Per WHATWG HTML specification, section 4.12.1.3, there are 
>> extremely
>> ++      // complicated rules for how to handle the set of opening tags <!--,
>> ++      // <script, and </script when they appear in JS literals (i.e. 
>> strings,
>> ++      // regexs, and comments). The specification suggests a simple 
>> solution,
>> ++      // rather than implementing the arcane ABNF, which involves simply 
>> escaping
>> ++      // the opening bracket with \x3C. We use the below regex for this, 
>> since it
>> ++      // makes doing the case-insensitive find-replace much simpler.
>> ++      specialScriptTagRE          = 
>> regexp.MustCompile("(?i)<(script|/script|!--)")
>> ++      specialScriptTagReplacement = []byte("\\x3C$1")
>> ++)
>> ++
>> ++func containsSpecialScriptTag(s []byte) bool {
>> ++      return specialScriptTagRE.Match(s)
>> ++}
>> ++
>> ++func escapeSpecialScriptTags(s []byte) []byte {
>> ++      return specialScriptTagRE.ReplaceAll(s, specialScriptTagReplacement)
>> ++}
>> ++
>> + var doctypeBytes = []byte("<!DOCTYPE")
>> +
>> + // escapeText escapes a text template node.
>> +@@ -708,6 +729,11 @@ func (e *escaper) escapeText(c context, n 
>> *parse.TextNode) context {
>> +                       b.Write(s[written:cs])
>> +                       written = i1
>> +               }
>> ++              if isInScriptLiteral(c.state) && 
>> containsSpecialScriptTag(s[i:i1]) {
>> ++                      b.Write(s[written:i])
>> ++                      b.Write(escapeSpecialScriptTags(s[i:i1]))
>> ++                      written = i1
>> ++              }
>> +               if i == i1 && c.state == c1.state {
>> +                       panic(fmt.Sprintf("infinite loop from %v to %v on 
>> %q..%q", c, c1, s[:i], s[i:]))
>> +               }
>> +diff --git a/src/html/template/escape_test.go 
>> b/src/html/template/escape_test.go
>> +index 5f41e52..0cacb20 100644
>> +--- a/src/html/template/escape_test.go
>> ++++ b/src/html/template/escape_test.go
>> +@@ -513,6 +513,21 @@ func TestEscape(t *testing.T) {
>> +                       "<script>#! beep\n</script>",
>> +                       "<script>\n</script>",
>> +               },
>> ++              {
>> ++                      "Special tags in <script> string literals",
>> ++                      `<script>var a = "asd < 123 <!-- 456 < fgh <script 
>> jkl < 789 </script"</script>`,
>> ++                      `<script>var a = "asd < 123 \x3C!-- 456 < fgh 
>> \x3Cscript jkl < 789 \x3C/script"</script>`,
>> ++              },
>> ++              {
>> ++                      "Special tags in <script> string literals (mixed 
>> case)",
>> ++                      `<script>var a = "<!-- <ScripT </ScripT"</script>`,
>> ++                      `<script>var a = "\x3C!-- \x3CScripT 
>> \x3C/ScripT"</script>`,
>> ++              },
>> ++              {
>> ++                      "Special tags in <script> regex literals (mixed 
>> case)",
>> ++                      `<script>var a = /<!-- <ScripT </ScripT/</script>`,
>> ++                      `<script>var a = /\x3C!-- \x3CScripT 
>> \x3C/ScripT/</script>`,
>> ++              },
>> +               {
>> +                       "CSS comments",
>> +                       "<style>p// paragraph\n" +
>> +@@ -1501,8 +1516,38 @@ func TestEscapeText(t *testing.T) {
>> +                       context{state: stateJS, element: elementScript},
>> +               },
>> +               {
>> ++                      // <script and </script tags are escaped, so 
>> </script> should not
>> ++                      // cause us to exit the JS state.
>> +                       
>> `<script>document.write("<script>alert(1)</script>");`,
>> +-                      context{state: stateText},
>> ++                      context{state: stateJS, element: elementScript},
>> ++              },
>> ++              {
>> ++                      `<script>document.write("<script>`,
>> ++                      context{state: stateJSDqStr, element: elementScript},
>> ++              },
>> ++              {
>> ++                      `<script>document.write("<script>alert(1)</script>`,
>> ++                      context{state: stateJSDqStr, element: elementScript},
>> ++              },
>> ++              {
>> ++                      `<script>document.write("<script>alert(1)<!--`,
>> ++                      context{state: stateJSDqStr, element: elementScript},
>> ++              },
>> ++              {
>> ++                      
>> `<script>document.write("<script>alert(1)</Script>");`,
>> ++                      context{state: stateJS, element: elementScript},
>> ++              },
>> ++              {
>> ++                      `<script>document.write("<!--");`,
>> ++                      context{state: stateJS, element: elementScript},
>> ++              },
>> ++              {
>> ++                      `<script>let a = /</script`,
>> ++                      context{state: stateJSRegexp, element: 
>> elementScript},
>> ++              },
>> ++              {
>> ++                      `<script>let a = /</script/`,
>> ++                      context{state: stateJS, element: elementScript, 
>> jsCtx: jsCtxDivOp},
>> +               },
>> +               {
>> +                       `<script type="text/template">`,
>> +diff --git a/src/html/template/transition.go 
>> b/src/html/template/transition.go
>> +index 12aa4c4..3d2a37c 100644
>> +--- a/src/html/template/transition.go
>> ++++ b/src/html/template/transition.go
>> +@@ -214,6 +214,11 @@ var (
>> + // element states.
>> + func tSpecialTagEnd(c context, s []byte) (context, int) {
>> +       if c.element != elementNone {
>> ++              // script end tags ("</script") within script literals are 
>> ignored, so that
>> ++              // we can properly escape them.
>> ++              if c.element == elementScript && (isInScriptLiteral(c.state) 
>> || isComment(c.state)) {
>> ++                      return c, len(s)
>> ++              }
>> +               if i := indexTagEnd(s, specialTagEndMarkers[c.element]); i 
>> != -1 {
>> +                       return context{}, i
>> +               }
>> +@@ -353,6 +358,16 @@ func tJSDelimited(c context, s []byte) (context, int) {
>> +                       inCharset = true
>> +               case ']':
>> +                       inCharset = false
>> ++              case '/':
>> ++                      // If "</script" appears in a regex literal, the '/' 
>> should not
>> ++                      // close the regex literal, and it will later be 
>> escaped to
>> ++                      // "\x3C/script" in escapeText.
>> ++                      if i > 0 && i+7 <= len(s) && 
>> bytes.Compare(bytes.ToLower(s[i-1:i+7]), []byte("</script")) == 0 {
>> ++                              i++
>> ++                      } else if !inCharset {
>> ++                              c.state, c.jsCtx = stateJS, jsCtxDivOp
>> ++                              return c, i + 1
>> ++                      }
>> +               default:
>> +                       // end delimiter
>> +                       if !inCharset {
>> +--
>> +2.24.4
>> +
>> --
>> 2.34.1
>>
>>
>> 
>>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#188410): 
https://lists.openembedded.org/g/openembedded-core/message/188410
Mute This Topic: https://lists.openembedded.org/mt/101589537/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to