The change is necessary to prevent this:

http://www.owasp.org/index.php/CRLF_Injection

It is not a major concern since this only applies to the case of a
value of f provided by the user.

This

URL(....f='open_option?id=....')

should be discouraged anyway because the value of id=... should not be
properly escaped.

Anyway, you are right that we do not want to break existing apps. I
changed it in trunk (337) to avoid the issue, while leaving the
security fix in place. Thanks for bringing this up.

Massimo

On Dec 31, 9:06 am, Fran <francisb...@googlemail.com> wrote:
> On Dec 31, 2:25 pm, mdipierro <mdipie...@cs.depaul.edu> wrote:
>
> > Are you calling it with
> > URL(....f='open_option?id=3')
> > instead of
> > URL(....f='open_option',vars=dict(id=3))
>
> Yes:
> URL(r=request,f='open_option?id=%s'%option.id)
>
> I can easily change this in my app, however I wonder how many other
> apps will break from having made the same error?
>
> F
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"web2py Web Framework" group.
To post to this group, send email to web2py@googlegroups.com
To unsubscribe from this group, send email to 
web2py+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/web2py?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to