rspec/rules/S5300/python/rule.adoc

55 lines
1.3 KiB
Plaintext
Raw Normal View History

2020-06-30 12:50:28 +02:00
include::../description.adoc[]
include::../ask-yourself.adoc[]
== Recommended Secure Coding Practices
* Use an email library which sanitizes headers (Flask-Mail or django.core.mail).
* Use html escape functions to sanitize every piece of data used to in the email body.
* Verify application logic to make sure that email base feature can not be abuse to:
2021-01-06 17:38:34 +01:00
** Send arbitrary email for spamming or fishing
** Disclose sensitive email content
2020-06-30 12:50:28 +02:00
== Sensitive Code Example
smtplib
2020-06-30 12:50:28 +02:00
----
import smtplib
def send(from_email, to_email, msg):
server = smtplib.SMTP('localhost', 1025)
server.sendmail(from_email, to_email, msg) # Sensitive
----
Django
2020-06-30 12:50:28 +02:00
----
from django.core.mail import send_mail
def send(subject, msg, from_email, to_email):
send_mail(subject, msg, from_email, [to_email]) # Sensitive
----
Flask-Mail
2020-06-30 12:50:28 +02:00
----
from flask import Flask
from flask_mail import Mail, Message
app = Flask(__name__)
def send(subject, msg, from_email, to_email):
mail = Mail(app)
msg = Message(subject, [to_email], body, sender=from_email)
mail.send(msg) # Sensitive{code}
----
include::../see.adoc[]
ifdef::env-github,rspecator-view[]
'''
== Comments And Links
(visible only on this page)
include::comments-and-links.adoc[]
endif::env-github,rspecator-view[]