-
-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sandbox URL Creation #102
Sandbox URL Creation #102
Conversation
Reviewer's Guide by SourceryThis pull request implements a security enhancement by sandboxing URL creation to protect against Server-Side Request Forgery (SSRF) attacks. The changes replace the standard Class diagram for safe_requests integrationclassDiagram
class FlaskApp {
+request_url()
}
class safe_requests {
+get(url, allowed_protocols)
}
FlaskApp --> safe_requests : uses
class requests {
+get(url)
}
requests <.. FlaskApp : replaced by safe_requests
File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We have skipped reviewing this pull request. It seems to have been created by a bot (hey, pixeebot[bot]!). We assume it knows what it's doing!
I'm confident in this change, but I'm not a maintainer of this project. Do you see any reason not to merge it? If this change was not helpful, or you have suggestions for improvements, please let me know! |
Just a friendly ping to remind you about this change. If there are concerns about it, we'd love to hear about them! |
This change may not be a priority right now, so I'll close it. If there was something I could have done better, please let me know! You can also customize me to make sure I'm working with you in the way you want. |
This codemod sandboxes calls to
requests.get
to be more resistant to Server-Side Request Forgery (SSRF) attacks.Most of the time when you make a
GET
request to a URL, you're intending to reference an HTTP endpoint, like an internal microservice. However, URLs can point to local file system files, a Gopher stream in your local network, a JAR file on a remote Internet site, and all kinds of other unexpected and undesirable outcomes. When the URL values are influenced by attackers, they can trick your application into fetching internal resources, running malicious code, or otherwise harming the system.Consider the following code for a Flask app:
In this case, an attacker could supply a value like
"http://169.254.169.254/user-data/"
and attempt to access user information.Our changes introduce sandboxing around URL creation that force developers to specify some boundaries on the types of URLs they expect to create:
This change alone reduces attack surface significantly because the default behavior of
safe_requests.get
raises aSecurityException
ifa user attempts to access a known infrastructure location, unless specifically disabled.
If you have feedback on this codemod, please let us know!
F.A.Q.
Why does this codemod require a Pixee dependency?
We always prefer to use built-in Python functions or one from a well-known and trusted community dependency. However, we cannot find any such control. If you know of one, please let us know.
Why is this codemod marked as Merge After Cursory Review?
By default, the protection only weaves in 2 checks, which we believe will not cause any issues with the vast majority of code:
However, on rare occasions an application may use a URL protocol like "file://" or "ftp://" in backend or middleware code.
If you want to allow those protocols, change the incoming PR to look more like this and get the best security possible:
Dependency Updates
This codemod relies on an external dependency. However, we were unable to automatically add the dependency to your project.
This library holds security tools for protecting Python API calls.
There are a number of places where Python project dependencies can be expressed, including
setup.py
,pyproject.toml
,setup.cfg
, andrequirements.txt
files. You may need to manually add this dependency to the proper location in your project.Manual Installation
For
setup.py
:install_requires=[ + "security==1.3.1", ],
For
pyproject.toml
(usingsetuptools
):[project] dependencies = [ + "security==1.3.1", ]
For
setup.cfg
:[options] install_requires = + security==1.3.1
For
requirements.txt
:+security==1.3.1
For more information on adding dependencies to
setuptools
projects, see the setuptools documentation.If you are using another build system, please refer to the documentation for that system to determine how to add dependencies.
More reading
🧚🤖 Powered by Pixeebot
Feedback | Community | Docs | Codemod ID: pixee:python/url-sandbox
Summary by Sourcery
Enhance security by replacing
requests.get
withsafe_requests.get
to sandbox URL requests and prevent SSRF attacks. Update project dependencies to include thesecurity
library, which provides the necessary tools for this enhancement.New Features:
safe_requests
module to enhance security against Server-Side Request Forgery (SSRF) attacks.Enhancements:
requests.get
withsafe_requests.get
across multiple modules to enforce URL validation and restrict access to potentially harmful endpoints.Build:
security
library to the project's dependency management files, which provides thesafe_requests
module.