Thank you for the update Steve! Thanks, Shubham Kulkarni
On Fri, Sep 29, 2023 at 9:18 PM Steve Sakoman <st...@sakoman.com> wrote: > On Fri, Sep 29, 2023 at 4:47 AM Shubham Kulkarni <skulka...@mvista.com> > wrote: > > > > Hi Steve, > > > > Is there any update on this? > > It is in my current test queue: > > > https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/dunfell-nut > > Steve > > > On Tue, Sep 26, 2023 at 9:38 AM Siddharth via lists.openembedded.org > <sdoshi=mvista....@lists.openembedded.org> wrote: > >> > >> From: Siddharth Doshi <sdo...@mvista.com> > >> > >> Upstream-Status: Backport from [ > https://github.com/golang/go/commit/023b542edf38e2a1f87fcefb9f75ff2f99401b4c > ] > >> CVE: CVE-2023-39318 > >> Upstream-Status: Backport from [ > https://github.com/golang/go/commit/2070531d2f53df88e312edace6c8dfc9686ab2f5 > ] > >> CVE: CVE-2023-39319 > >> Signed-off-by: Siddharth Doshi <sdo...@mvista.com> > >> --- > >> meta/recipes-devtools/go/go-1.14.inc | 2 + > >> .../go/go-1.14/CVE-2023-39318.patch | 238 ++++++++++++++++++ > >> .../go/go-1.14/CVE-2023-39319.patch | 230 +++++++++++++++++ > >> 3 files changed, 470 insertions(+) > >> create mode 100644 > meta/recipes-devtools/go/go-1.14/CVE-2023-39318.patch > >> create mode 100644 > meta/recipes-devtools/go/go-1.14/CVE-2023-39319.patch > >> > >> diff --git a/meta/recipes-devtools/go/go-1.14.inc > b/meta/recipes-devtools/go/go-1.14.inc > >> index 20377e095b..9fc5eb130f 100644 > >> --- a/meta/recipes-devtools/go/go-1.14.inc > >> +++ b/meta/recipes-devtools/go/go-1.14.inc > >> @@ -70,6 +70,8 @@ SRC_URI += "\ > >> file://CVE-2023-29400.patch \ > >> file://CVE-2023-29406.patch \ > >> file://CVE-2023-29409.patch \ > >> + file://CVE-2023-39318.patch \ > >> + file://CVE-2023-39319.patch \ > >> " > >> > >> SRC_URI_append_libc-musl = " > file://0009-ld-replace-glibc-dynamic-linker-with-musl.patch" > >> diff --git a/meta/recipes-devtools/go/go-1.14/CVE-2023-39318.patch > b/meta/recipes-devtools/go/go-1.14/CVE-2023-39318.patch > >> new file mode 100644 > >> index 0000000000..20e70c0485 > >> --- /dev/null > >> +++ b/meta/recipes-devtools/go/go-1.14/CVE-2023-39318.patch > >> @@ -0,0 +1,238 @@ > >> +From 023b542edf38e2a1f87fcefb9f75ff2f99401b4c Mon Sep 17 00:00:00 2001 > >> +From: Roland Shoemaker <bracew...@google.com> > >> +Date: Thu, 3 Aug 2023 12:24:13 -0700 > >> +Subject: [PATCH] [release-branch.go1.20] html/template: support > HTML-like > >> + comments in script contexts > >> + > >> +Per Appendix B.1.1 of the ECMAScript specification, support HTML-like > >> +comments in script contexts. Also per section 12.5, support hashbang > >> +comments. This brings our parsing in-line with how browsers treat these > >> +comment types. > >> + > >> +Thanks to Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.) for > >> +reporting this issue. > >> + > >> +Fixes #62196 > >> +Fixes #62395 > >> +Fixes CVE-2023-39318 > >> + > >> +Change-Id: Id512702c5de3ae46cf648e268cb10e1eb392a181 > >> +Reviewed-on: > https://team-review.git.corp.google.com/c/golang/go-private/+/1976593 > >> +Run-TryBot: Roland Shoemaker <bracew...@google.com> > >> +Reviewed-by: Tatiana Bradley <tatianabrad...@google.com> > >> +Reviewed-by: Damien Neil <dn...@google.com> > >> +Reviewed-by: Dmitri Shuralyov <dmits...@google.com> > >> +Reviewed-on: > https://team-review.git.corp.google.com/c/golang/go-private/+/2014620 > >> +Reviewed-on: https://go-review.googlesource.com/c/go/+/526098 > >> +Run-TryBot: Cherry Mui <cherr...@google.com> > >> +TryBot-Result: Gopher Robot <go...@golang.org> > >> + > >> +Upstream-Status: Backport from [ > https://github.com/golang/go/commit/023b542edf38e2a1f87fcefb9f75ff2f99401b4c > ] > >> +CVE: CVE-2023-39318 > >> +Signed-off-by: Siddharth Doshi <sdo...@mvista.com> > >> +--- > >> + src/html/template/context.go | 6 ++- > >> + src/html/template/escape.go | 5 +- > >> + src/html/template/escape_test.go | 10 ++++ > >> + src/html/template/state_string.go | 4 +- > >> + src/html/template/transition.go | 80 ++++++++++++++++++++----------- > >> + 5 files changed, 72 insertions(+), 33 deletions(-) > >> + > >> +diff --git a/src/html/template/context.go > b/src/html/template/context.go > >> +index 0b65313..4eb7891 100644 > >> +--- a/src/html/template/context.go > >> ++++ b/src/html/template/context.go > >> +@@ -124,6 +124,10 @@ const ( > >> + stateJSBlockCmt > >> + // stateJSLineCmt occurs inside a JavaScript // line comment. > >> + stateJSLineCmt > >> ++ // stateJSHTMLOpenCmt occurs inside a JavaScript <!-- HTML-like > comment. > >> ++ stateJSHTMLOpenCmt > >> ++ // stateJSHTMLCloseCmt occurs inside a JavaScript --> HTML-like > comment. > >> ++ stateJSHTMLCloseCmt > >> + // stateCSS occurs inside a <style> element or style attribute. > >> + stateCSS > >> + // stateCSSDqStr occurs inside a CSS double quoted string. > >> +@@ -149,7 +153,7 @@ const ( > >> + // authors & maintainers, not for end-users or machines. > >> + func isComment(s state) bool { > >> + switch s { > >> +- case stateHTMLCmt, stateJSBlockCmt, stateJSLineCmt, > stateCSSBlockCmt, stateCSSLineCmt: > >> ++ case stateHTMLCmt, stateJSBlockCmt, stateJSLineCmt, > stateJSHTMLOpenCmt, stateJSHTMLCloseCmt, stateCSSBlockCmt, stateCSSLineCmt: > >> + return true > >> + } > >> + return false > >> +diff --git a/src/html/template/escape.go b/src/html/template/escape.go > >> +index 435f912..ad2ec69 100644 > >> +--- a/src/html/template/escape.go > >> ++++ b/src/html/template/escape.go > >> +@@ -698,9 +698,12 @@ func (e *escaper) escapeText(c context, n > *parse.TextNode) context { > >> + if c.state != c1.state && isComment(c1.state) && > c1.delim == delimNone { > >> + // Preserve the portion between written and the > comment start. > >> + cs := i1 - 2 > >> +- if c1.state == stateHTMLCmt { > >> ++ if c1.state == stateHTMLCmt || c1.state == > stateJSHTMLOpenCmt { > >> + // "<!--" instead of "/*" or "//" > >> + cs -= 2 > >> ++ } else if c1.state == stateJSHTMLCloseCmt { > >> ++ // "-->" instead of "/*" or "//" > >> ++ cs -= 1 > >> + } > >> + b.Write(s[written:cs]) > >> + written = i1 > >> +diff --git a/src/html/template/escape_test.go > b/src/html/template/escape_test.go > >> +index f550691..5f41e52 100644 > >> +--- a/src/html/template/escape_test.go > >> ++++ b/src/html/template/escape_test.go > >> +@@ -503,6 +503,16 @@ func TestEscape(t *testing.T) { > >> + "<script>var a/*b*///c\nd</script>", > >> + "<script>var a \nd</script>", > >> + }, > >> ++ { > >> ++ "JS HTML-like comments", > >> ++ "<script>before <!-- > beep\nbetween\nbefore-->boop\n</script>", > >> ++ "<script>before \nbetween\nbefore\n</script>", > >> ++ }, > >> ++ { > >> ++ "JS hashbang comment", > >> ++ "<script>#! beep\n</script>", > >> ++ "<script>\n</script>", > >> ++ }, > >> + { > >> + "CSS comments", > >> + "<style>p// paragraph\n" + > >> +diff --git a/src/html/template/state_string.go > b/src/html/template/state_string.go > >> +index 05104be..b5cfe70 100644 > >> +--- a/src/html/template/state_string.go > >> ++++ b/src/html/template/state_string.go > >> +@@ -4,9 +4,9 @@ package template > >> + > >> + import "strconv" > >> + > >> +-const _state_name = > "stateTextstateTagstateAttrNamestateAfterNamestateBeforeValuestateHTMLCmtstateRCDATAstateAttrstateURLstateSrcsetstateJSstateJSDqStrstateJSSqStrstateJSRegexpstateJSBlockCmtstateJSLineCmtstateCSSstateCSSDqStrstateCSSSqStrstateCSSDqURLstateCSSSqURLstateCSSURLstateCSSBlockCmtstateCSSLineCmtstateError" > >> ++const _state_name = > "stateTextstateTagstateAttrNamestateAfterNamestateBeforeValuestateHTMLCmtstateRCDATAstateAttrstateURLstateSrcsetstateJSstateJSDqStrstateJSSqStrstateJSBqStrstateJSRegexpstateJSBlockCmtstateJSLineCmtstateJSHTMLOpenCmtstateJSHTMLCloseCmtstateCSSstateCSSDqStrstateCSSSqStrstateCSSDqURLstateCSSSqURLstateCSSURLstateCSSBlockCmtstateCSSLineCmtstateErrorstateDead" > >> + > >> +-var _state_index = [...]uint16{0, 9, 17, 30, 44, 60, 72, 83, 92, 100, > 111, 118, 130, 142, 155, 170, 184, 192, 205, 218, 231, 244, 255, 271, 286, > 296} > >> ++var _state_index = [...]uint16{0, 9, 17, 30, 44, 60, 72, 83, 92, 100, > 111, 118, 130, 142, 154, 167, 182, 196, 214, 233, 241, 254, 267, 280, 293, > 304, 320, 335, 345, 354} > >> + > >> + func (i state) String() string { > >> + if i >= state(len(_state_index)-1) { > >> +diff --git a/src/html/template/transition.go > b/src/html/template/transition.go > >> +index 92eb351..12aa4c4 100644 > >> +--- a/src/html/template/transition.go > >> ++++ b/src/html/template/transition.go > >> +@@ -14,32 +14,34 @@ import ( > >> + // the updated context and the number of bytes consumed from the > front of the > >> + // input. > >> + var transitionFunc = [...]func(context, []byte) (context, int){ > >> +- stateText: tText, > >> +- stateTag: tTag, > >> +- stateAttrName: tAttrName, > >> +- stateAfterName: tAfterName, > >> +- stateBeforeValue: tBeforeValue, > >> +- stateHTMLCmt: tHTMLCmt, > >> +- stateRCDATA: tSpecialTagEnd, > >> +- stateAttr: tAttr, > >> +- stateURL: tURL, > >> +- stateSrcset: tURL, > >> +- stateJS: tJS, > >> +- stateJSDqStr: tJSDelimited, > >> +- stateJSSqStr: tJSDelimited, > >> +- stateJSBqStr: tJSDelimited, > >> +- stateJSRegexp: tJSDelimited, > >> +- stateJSBlockCmt: tBlockCmt, > >> +- stateJSLineCmt: tLineCmt, > >> +- stateCSS: tCSS, > >> +- stateCSSDqStr: tCSSStr, > >> +- stateCSSSqStr: tCSSStr, > >> +- stateCSSDqURL: tCSSStr, > >> +- stateCSSSqURL: tCSSStr, > >> +- stateCSSURL: tCSSStr, > >> +- stateCSSBlockCmt: tBlockCmt, > >> +- stateCSSLineCmt: tLineCmt, > >> +- stateError: tError, > >> ++ stateText: tText, > >> ++ stateTag: tTag, > >> ++ stateAttrName: tAttrName, > >> ++ stateAfterName: tAfterName, > >> ++ stateBeforeValue: tBeforeValue, > >> ++ stateHTMLCmt: tHTMLCmt, > >> ++ stateRCDATA: tSpecialTagEnd, > >> ++ stateAttr: tAttr, > >> ++ stateURL: tURL, > >> ++ stateSrcset: tURL, > >> ++ stateJS: tJS, > >> ++ stateJSDqStr: tJSDelimited, > >> ++ stateJSSqStr: tJSDelimited, > >> ++ stateJSBqStr: tJSDelimited, > >> ++ stateJSRegexp: tJSDelimited, > >> ++ stateJSBlockCmt: tBlockCmt, > >> ++ stateJSLineCmt: tLineCmt, > >> ++ stateJSHTMLOpenCmt: tLineCmt, > >> ++ stateJSHTMLCloseCmt: tLineCmt, > >> ++ stateCSS: tCSS, > >> ++ stateCSSDqStr: tCSSStr, > >> ++ stateCSSSqStr: tCSSStr, > >> ++ stateCSSDqURL: tCSSStr, > >> ++ stateCSSSqURL: tCSSStr, > >> ++ stateCSSURL: tCSSStr, > >> ++ stateCSSBlockCmt: tBlockCmt, > >> ++ stateCSSLineCmt: tLineCmt, > >> ++ stateError: tError, > >> + } > >> + > >> + var commentStart = []byte("<!--") > >> +@@ -263,7 +265,7 @@ func tURL(c context, s []byte) (context, int) { > >> + > >> + // tJS is the context transition function for the JS state. > >> + func tJS(c context, s []byte) (context, int) { > >> +- i := bytes.IndexAny(s, "\"`'/") > >> ++ i := bytes.IndexAny(s, "\"`'/<-#") > >> + if i == -1 { > >> + // Entire input is non string, comment, regexp tokens. > >> + c.jsCtx = nextJSCtx(s, c.jsCtx) > >> +@@ -293,6 +295,26 @@ func tJS(c context, s []byte) (context, int) { > >> + err: errorf(ErrSlashAmbig, nil, 0, > "'/' could start a division or regexp: %.32q", s[i:]), > >> + }, len(s) > >> + } > >> ++ // ECMAScript supports HTML style comments for legacy reasons, > see Appendix > >> ++ // B.1.1 "HTML-like Comments". The handling of these comments > is somewhat > >> ++ // confusing. Multi-line comments are not supported, i.e. > anything on lines > >> ++ // between the opening and closing tokens is not considered a > comment, but > >> ++ // anything following the opening or closing token, on the same > line, is > >> ++ // ignored. As such we simply treat any line prefixed with > "<!--" or "-->" > >> ++ // as if it were actually prefixed with "//" and move on. > >> ++ case '<': > >> ++ if i+3 < len(s) && bytes.Equal(commentStart, s[i:i+4]) { > >> ++ c.state, i = stateJSHTMLOpenCmt, i+3 > >> ++ } > >> ++ case '-': > >> ++ if i+2 < len(s) && bytes.Equal(commentEnd, s[i:i+3]) { > >> ++ c.state, i = stateJSHTMLCloseCmt, i+2 > >> ++ } > >> ++ // ECMAScript also supports "hashbang" comment lines, see > Section 12.5. > >> ++ case '#': > >> ++ if i+1 < len(s) && s[i+1] == '!' { > >> ++ c.state, i = stateJSLineCmt, i+1 > >> ++ } > >> + default: > >> + panic("unreachable") > >> + } > >> +@@ -372,12 +394,12 @@ func tBlockCmt(c context, s []byte) (context, > int) { > >> + return c, i + 2 > >> + } > >> + > >> +-// tLineCmt is the context transition function for //comment states. > >> ++// tLineCmt is the context transition function for //comment states, > and the JS HTML-like comment state. > >> + func tLineCmt(c context, s []byte) (context, int) { > >> + var lineTerminators string > >> + var endState state > >> + switch c.state { > >> +- case stateJSLineCmt: > >> ++ case stateJSLineCmt, stateJSHTMLOpenCmt, stateJSHTMLCloseCmt: > >> + lineTerminators, endState = "\n\r\u2028\u2029", stateJS > >> + case stateCSSLineCmt: > >> + lineTerminators, endState = "\n\f\r", stateCSS > >> +-- > >> +2.24.4 > >> + > >> diff --git a/meta/recipes-devtools/go/go-1.14/CVE-2023-39319.patch > b/meta/recipes-devtools/go/go-1.14/CVE-2023-39319.patch > >> new file mode 100644 > >> index 0000000000..69106e3e05 > >> --- /dev/null > >> +++ b/meta/recipes-devtools/go/go-1.14/CVE-2023-39319.patch > >> @@ -0,0 +1,230 @@ > >> +From 2070531d2f53df88e312edace6c8dfc9686ab2f5 Mon Sep 17 00:00:00 2001 > >> +From: Roland Shoemaker <bracew...@google.com> > >> +Date: Thu, 3 Aug 2023 12:28:28 -0700 > >> +Subject: [PATCH] [release-branch.go1.20] html/template: properly handle > >> + special tags within the script context > >> + > >> +The HTML specification has incredibly complex rules for how to handle > >> +"<!--", "<script", and "</script" when they appear within literals in > >> +the script context. Rather than attempting to apply these restrictions > >> +(which require a significantly more complex state machine) we apply > >> +the workaround suggested in section 4.12.1.3 of the HTML specification > [1]. > >> + > >> +More precisely, when "<!--", "<script", and "</script" appear within > >> +literals (strings and regular expressions, ignoring comments since we > >> +already elide their content) we replace the "<" with "\x3C". This > avoids > >> +the unintuitive behavior that using these tags within literals can > cause, > >> +by simply preventing the rendered content from triggering it. This may > >> +break some correct usages of these tags, but on balance is more likely > >> +to prevent XSS attacks where users are unknowingly either closing or > not > >> +closing the script blocks where they think they are. > >> + > >> +Thanks to Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.) for > >> +reporting this issue. > >> + > >> +Fixes #62197 > >> +Fixes #62397 > >> +Fixes CVE-2023-39319 > >> + > >> +[1] > https://html.spec.whatwg.org/#restrictions-for-contents-of-script-elements > >> + > >> +Change-Id: Iab57b0532694827e3eddf57a7497ba1fab1746dc > >> +Reviewed-on: > https://team-review.git.corp.google.com/c/golang/go-private/+/1976594 > >> +Reviewed-by: Dmitri Shuralyov <dmits...@google.com> > >> +Reviewed-by: Tatiana Bradley <tatianabrad...@google.com> > >> +Reviewed-by: Damien Neil <dn...@google.com> > >> +Run-TryBot: Roland Shoemaker <bracew...@google.com> > >> +Reviewed-on: > https://team-review.git.corp.google.com/c/golang/go-private/+/2014621 > >> +TryBot-Result: Security TryBots < > security-tryb...@go-security-trybots.iam.gserviceaccount.com> > >> +Reviewed-on: https://go-review.googlesource.com/c/go/+/526099 > >> +TryBot-Result: Gopher Robot <go...@golang.org> > >> +Run-TryBot: Cherry Mui <cherr...@google.com> > >> + > >> +Upstream-Status: Backport from [ > https://github.com/golang/go/commit/2070531d2f53df88e312edace6c8dfc9686ab2f5 > ] > >> +CVE: CVE-2023-39319 > >> +Signed-off-by: Siddharth Doshi <sdo...@mvista.com> > >> +--- > >> + src/html/template/context.go | 14 ++++++++++ > >> + src/html/template/escape.go | 26 ++++++++++++++++++ > >> + src/html/template/escape_test.go | 47 +++++++++++++++++++++++++++++++- > >> + src/html/template/transition.go | 15 ++++++++++ > >> + 4 files changed, 101 insertions(+), 1 deletion(-) > >> + > >> +diff --git a/src/html/template/context.go > b/src/html/template/context.go > >> +index 4eb7891..feb6517 100644 > >> +--- a/src/html/template/context.go > >> ++++ b/src/html/template/context.go > >> +@@ -168,6 +168,20 @@ func isInTag(s state) bool { > >> + return false > >> + } > >> + > >> ++// isInScriptLiteral returns true if s is one of the literal states > within a > >> ++// <script> tag, and as such occurances of "<!--", "<script", and > "</script" > >> ++// need to be treated specially. > >> ++func isInScriptLiteral(s state) bool { > >> ++ // Ignore the comment states (stateJSBlockCmt, stateJSLineCmt, > >> ++ // stateJSHTMLOpenCmt, stateJSHTMLCloseCmt) because their > content is already > >> ++ // omitted from the output. > >> ++ switch s { > >> ++ case stateJSDqStr, stateJSSqStr, stateJSBqStr, stateJSRegexp: > >> ++ return true > >> ++ } > >> ++ return false > >> ++} > >> ++ > >> + // delim is the delimiter that will end the current HTML attribute. > >> + type delim uint8 > >> + > >> +diff --git a/src/html/template/escape.go b/src/html/template/escape.go > >> +index ad2ec69..de8cf6f 100644 > >> +--- a/src/html/template/escape.go > >> ++++ b/src/html/template/escape.go > >> +@@ -10,6 +10,7 @@ import ( > >> + "html" > >> + "internal/godebug" > >> + "io" > >> ++ "regexp" > >> + "text/template" > >> + "text/template/parse" > >> + ) > >> +@@ -650,6 +651,26 @@ var delimEnds = [...]string{ > >> + delimSpaceOrTagEnd: " \t\n\f\r>", > >> + } > >> + > >> ++var ( > >> ++ // Per WHATWG HTML specification, section 4.12.1.3, there are > extremely > >> ++ // complicated rules for how to handle the set of opening tags > <!--, > >> ++ // <script, and </script when they appear in JS literals (i.e. > strings, > >> ++ // regexs, and comments). The specification suggests a simple > solution, > >> ++ // rather than implementing the arcane ABNF, which involves > simply escaping > >> ++ // the opening bracket with \x3C. We use the below regex for > this, since it > >> ++ // makes doing the case-insensitive find-replace much simpler. > >> ++ specialScriptTagRE = > regexp.MustCompile("(?i)<(script|/script|!--)") > >> ++ specialScriptTagReplacement = []byte("\\x3C$1") > >> ++) > >> ++ > >> ++func containsSpecialScriptTag(s []byte) bool { > >> ++ return specialScriptTagRE.Match(s) > >> ++} > >> ++ > >> ++func escapeSpecialScriptTags(s []byte) []byte { > >> ++ return specialScriptTagRE.ReplaceAll(s, > specialScriptTagReplacement) > >> ++} > >> ++ > >> + var doctypeBytes = []byte("<!DOCTYPE") > >> + > >> + // escapeText escapes a text template node. > >> +@@ -708,6 +729,11 @@ func (e *escaper) escapeText(c context, n > *parse.TextNode) context { > >> + b.Write(s[written:cs]) > >> + written = i1 > >> + } > >> ++ if isInScriptLiteral(c.state) && > containsSpecialScriptTag(s[i:i1]) { > >> ++ b.Write(s[written:i]) > >> ++ b.Write(escapeSpecialScriptTags(s[i:i1])) > >> ++ written = i1 > >> ++ } > >> + if i == i1 && c.state == c1.state { > >> + panic(fmt.Sprintf("infinite loop from %v to %v > on %q..%q", c, c1, s[:i], s[i:])) > >> + } > >> +diff --git a/src/html/template/escape_test.go > b/src/html/template/escape_test.go > >> +index 5f41e52..0cacb20 100644 > >> +--- a/src/html/template/escape_test.go > >> ++++ b/src/html/template/escape_test.go > >> +@@ -513,6 +513,21 @@ func TestEscape(t *testing.T) { > >> + "<script>#! beep\n</script>", > >> + "<script>\n</script>", > >> + }, > >> ++ { > >> ++ "Special tags in <script> string literals", > >> ++ `<script>var a = "asd < 123 <!-- 456 < fgh > <script jkl < 789 </script"</script>`, > >> ++ `<script>var a = "asd < 123 \x3C!-- 456 < fgh > \x3Cscript jkl < 789 \x3C/script"</script>`, > >> ++ }, > >> ++ { > >> ++ "Special tags in <script> string literals > (mixed case)", > >> ++ `<script>var a = "<!-- <ScripT > </ScripT"</script>`, > >> ++ `<script>var a = "\x3C!-- \x3CScripT > \x3C/ScripT"</script>`, > >> ++ }, > >> ++ { > >> ++ "Special tags in <script> regex literals (mixed > case)", > >> ++ `<script>var a = /<!-- <ScripT > </ScripT/</script>`, > >> ++ `<script>var a = /\x3C!-- \x3CScripT > \x3C/ScripT/</script>`, > >> ++ }, > >> + { > >> + "CSS comments", > >> + "<style>p// paragraph\n" + > >> +@@ -1501,8 +1516,38 @@ func TestEscapeText(t *testing.T) { > >> + context{state: stateJS, element: elementScript}, > >> + }, > >> + { > >> ++ // <script and </script tags are escaped, so > </script> should not > >> ++ // cause us to exit the JS state. > >> + > `<script>document.write("<script>alert(1)</script>");`, > >> +- context{state: stateText}, > >> ++ context{state: stateJS, element: elementScript}, > >> ++ }, > >> ++ { > >> ++ `<script>document.write("<script>`, > >> ++ context{state: stateJSDqStr, element: > elementScript}, > >> ++ }, > >> ++ { > >> ++ > `<script>document.write("<script>alert(1)</script>`, > >> ++ context{state: stateJSDqStr, element: > elementScript}, > >> ++ }, > >> ++ { > >> ++ `<script>document.write("<script>alert(1)<!--`, > >> ++ context{state: stateJSDqStr, element: > elementScript}, > >> ++ }, > >> ++ { > >> ++ > `<script>document.write("<script>alert(1)</Script>");`, > >> ++ context{state: stateJS, element: elementScript}, > >> ++ }, > >> ++ { > >> ++ `<script>document.write("<!--");`, > >> ++ context{state: stateJS, element: elementScript}, > >> ++ }, > >> ++ { > >> ++ `<script>let a = /</script`, > >> ++ context{state: stateJSRegexp, element: > elementScript}, > >> ++ }, > >> ++ { > >> ++ `<script>let a = /</script/`, > >> ++ context{state: stateJS, element: elementScript, > jsCtx: jsCtxDivOp}, > >> + }, > >> + { > >> + `<script type="text/template">`, > >> +diff --git a/src/html/template/transition.go > b/src/html/template/transition.go > >> +index 12aa4c4..3d2a37c 100644 > >> +--- a/src/html/template/transition.go > >> ++++ b/src/html/template/transition.go > >> +@@ -214,6 +214,11 @@ var ( > >> + // element states. > >> + func tSpecialTagEnd(c context, s []byte) (context, int) { > >> + if c.element != elementNone { > >> ++ // script end tags ("</script") within script literals > are ignored, so that > >> ++ // we can properly escape them. > >> ++ if c.element == elementScript && > (isInScriptLiteral(c.state) || isComment(c.state)) { > >> ++ return c, len(s) > >> ++ } > >> + if i := indexTagEnd(s, > specialTagEndMarkers[c.element]); i != -1 { > >> + return context{}, i > >> + } > >> +@@ -353,6 +358,16 @@ func tJSDelimited(c context, s []byte) (context, > int) { > >> + inCharset = true > >> + case ']': > >> + inCharset = false > >> ++ case '/': > >> ++ // If "</script" appears in a regex literal, > the '/' should not > >> ++ // close the regex literal, and it will later > be escaped to > >> ++ // "\x3C/script" in escapeText. > >> ++ if i > 0 && i+7 <= len(s) && > bytes.Compare(bytes.ToLower(s[i-1:i+7]), []byte("</script")) == 0 { > >> ++ i++ > >> ++ } else if !inCharset { > >> ++ c.state, c.jsCtx = stateJS, jsCtxDivOp > >> ++ return c, i + 1 > >> ++ } > >> + default: > >> + // end delimiter > >> + if !inCharset { > >> +-- > >> +2.24.4 > >> + > >> -- > >> 2.34.1 > >> > >> > >> > >> >
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#188411): https://lists.openembedded.org/g/openembedded-core/message/188411 Mute This Topic: https://lists.openembedded.org/mt/101589537/21656 Group Owner: openembedded-core+ow...@lists.openembedded.org Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-