The reason is that mark_safe and mark_for_escaping don't account for
`__html__`. As a consequence escaping information is lost once these
functions get called, and they're called in many places.
Thanks mitsuhiko for the report.
--
Ticket URL: <https://code.djangoproject.com/ticket/23831>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.
* owner: nobody => aaugustin
* status: new => assigned
--
Ticket URL: <https://code.djangoproject.com/ticket/23831#comment:1>
Comment (by collinanderson):
This change makes sense to me, but I don't feel like I'm much of an expert
here.
--
Ticket URL: <https://code.djangoproject.com/ticket/23831#comment:2>
* has_patch: 0 => 1
* version: master => 1.7
* stage: Accepted => Ready for checkin
--
Ticket URL: <https://code.djangoproject.com/ticket/23831#comment:3>
* status: assigned => closed
* resolution: => fixed
Comment:
In [changeset:"6d52f6f8e688b5c4e70be8352eb02c05fea60e85"]:
{{{
#!CommitTicketReference repository=""
revision="6d52f6f8e688b5c4e70be8352eb02c05fea60e85"
Fixed #23831 -- Supported strings escaped by third-party libs in Django.
Refs #7261 -- Made strings escaped by Django usable in third-party libs.
The changes in mark_safe and mark_for_escaping are straightforward. The
more tricky part is to handle correctly objects that implement __html__.
Historically escape() has escaped SafeData. Even if that doesn't seem a
good behavior, changing it would create security concerns. Therefore
support for __html__() was only added to conditional_escape() where this
concern doesn't exist.
Then using conditional_escape() instead of escape() in the Django
template engine makes it understand data escaped by other libraries.
Template filter |escape accounts for __html__() when it's available.
|force_escape forces the use of Django's HTML escaping implementation.
Here's why the change in render_value_in_context() is safe. Before Django
1.7 conditional_escape() was implemented as follows:
if isinstance(text, SafeData):
return text
else:
return escape(text)
render_value_in_context() never called escape() on SafeData. Therefore
replacing escape() with conditional_escape() doesn't change the
autoescaping logic as it was originally intended.
This change should be backported to Django 1.7 because it corrects a
feature added in Django 1.7.
Thanks mitsuhiko for the report.
}}}
--
Ticket URL: <https://code.djangoproject.com/ticket/23831#comment:4>
Comment (by Aymeric Augustin <aymeric.augustin@…>):
In [changeset:"3483682749577b4b5a8141a766489d5b460e30e9"]:
{{{
#!CommitTicketReference repository=""
revision="3483682749577b4b5a8141a766489d5b460e30e9"
[1.7.x] Fixed #23831 -- Supported strings escaped by third-party libs in
Django.
Refs #7261 -- Made strings escaped by Django usable in third-party libs.
The changes in mark_safe and mark_for_escaping are straightforward. The
more tricky part is to handle correctly objects that implement __html__.
Historically escape() has escaped SafeData. Even if that doesn't seem a
good behavior, changing it would create security concerns. Therefore
support for __html__() was only added to conditional_escape() where this
concern doesn't exist.
Then using conditional_escape() instead of escape() in the Django
template engine makes it understand data escaped by other libraries.
Template filter |escape accounts for __html__() when it's available.
|force_escape forces the use of Django's HTML escaping implementation.
Here's why the change in render_value_in_context() is safe. Before Django
1.7 conditional_escape() was implemented as follows:
if isinstance(text, SafeData):
return text
else:
return escape(text)
render_value_in_context() never called escape() on SafeData. Therefore
replacing escape() with conditional_escape() doesn't change the
autoescaping logic as it was originally intended.
This change should be backported to Django 1.7 because it corrects a
feature added in Django 1.7.
Thanks mitsuhiko for the report.
Backport of 6d52f6f from master.
}}}
--
Ticket URL: <https://code.djangoproject.com/ticket/23831#comment:5>