flask/docs/web-security.rst

296 lines
12 KiB
ReStructuredText
Raw Normal View History

2010-06-11 05:06:54 +08:00
Security Considerations
=======================
2024-11-02 04:13:05 +08:00
Web applications face many types of potential security problems, and it can be
hard to get everything right, or even to know what "right" is in general. Flask
tries to solve a few of these things by default, but there are other parts you
may have to take care of yourself. Many of these solutions are tradeoffs, and
will depend on each application's specific needs and threat model. Many hosting
platforms may take care of certain types of problems without the need for the
Flask application to handle them.
Resource Use
------------
A common category of attacks is "Denial of Service" (DoS or DDoS). This is a
very broad category, and different variants target different layers in a
deployed application. In general, something is done to increase how much
processing time or memory is used to handle each request, to the point where
there are not enough resources to handle legitimate requests.
Flask provides a few configuration options to handle resource use. They can
also be set on individual requests to customize only that request. The
documentation for each goes into more detail.
- :data:`MAX_CONTENT_LENGTH` or :attr:`.Request.max_content_length` controls
how much data will be read from a request. It is not set by default,
although it will still block truly unlimited streams unless the WSGI server
indicates support.
- :data:`MAX_FORM_MEMORY_SIZE` or :attr:`.Request.max_form_memory_size`
controls how large any non-file ``multipart/form-data`` field can be. It is
set to 500kB by default.
- :data:`MAX_FORM_PARTS` or :attr:`.Request.max_form_parts` controls how many
``multipart/form-data`` fields can be parsed. It is set to 1000 by default.
Combined with the default `max_form_memory_size`, this means that a form
will occupy at most 500MB of memory.
Regardless of these settings, you should also review what settings are available
from your operating system, container deployment (Docker etc), WSGI server, HTTP
server, and hosting platform. They typically have ways to set process resource
limits, timeouts, and other checks regardless of how Flask is configured.
2010-06-11 05:06:54 +08:00
.. _security-xss:
2010-06-11 05:06:54 +08:00
Cross-Site Scripting (XSS)
--------------------------
Cross site scripting is the concept of injecting arbitrary HTML (and with
it JavaScript) into the context of a website. To remedy this, developers
have to properly escape text so that it cannot include arbitrary HTML
tags. For more information on that have a look at the Wikipedia article
on `Cross-Site Scripting
<https://en.wikipedia.org/wiki/Cross-site_scripting>`_.
2010-06-11 05:06:54 +08:00
Flask configures Jinja2 to automatically escape all values unless
explicitly told otherwise. This should rule out all XSS problems caused
in templates, but there are still other places where you have to be
careful:
- generating HTML without the help of Jinja2
2023-02-24 00:55:01 +08:00
- calling :class:`~markupsafe.Markup` on data submitted by users
2010-06-11 05:06:54 +08:00
- sending out HTML from uploaded files, never do that, use the
2014-11-05 16:42:40 +08:00
``Content-Disposition: attachment`` header to prevent that problem.
2010-06-11 05:06:54 +08:00
- sending out textfiles from uploaded files. Some browsers are using
content-type guessing based on the first few bytes so users could
trick a browser to execute HTML.
Another thing that is very important are unquoted attributes. While
Jinja2 can protect you from XSS issues by escaping HTML, there is one
thing it cannot protect you from: XSS by attribute injection. To counter
this possible attack vector, be sure to always quote your attributes with
either double or single quotes when using Jinja expressions in them:
.. sourcecode:: html+jinja
<input value="{{ value }}">
Why is this necessary? Because if you would not be doing that, an
attacker could easily inject custom JavaScript handlers. For example an
attacker could inject this piece of HTML+JavaScript:
.. sourcecode:: html
onmouseover=alert(document.cookie)
When the user would then move with the mouse over the input, the cookie
would be presented to the user in an alert window. But instead of showing
the cookie to the user, a good attacker might also execute any other
JavaScript code. In combination with CSS injections the attacker might
even make the element fill out the entire page so that the user would
just have to have the mouse anywhere on the page to trigger the attack.
There is one class of XSS issues that Jinja's escaping does not protect
against. The ``a`` tag's ``href`` attribute can contain a `javascript:` URI,
which the browser will execute when clicked if not secured properly.
.. sourcecode:: html
<a href="{{ value }}">click here</a>
<a href="javascript:alert('unsafe');">click here</a>
To prevent this, you'll need to set the :ref:`security-csp` response header.
2010-06-11 05:06:54 +08:00
Cross-Site Request Forgery (CSRF)
---------------------------------
Another big problem is CSRF. This is a very complex topic and I won't
outline it here in detail just mention what it is and how to theoretically
prevent it.
If your authentication information is stored in cookies, you have implicit
state management. The state of "being logged in" is controlled by a
cookie, and that cookie is sent with each request to a page.
Unfortunately that includes requests triggered by 3rd party sites. If you
don't keep that in mind, some people might be able to trick your
application's users with social engineering to do stupid things without
them knowing.
2010-06-11 05:06:54 +08:00
Say you have a specific URL that, when you sent ``POST`` requests to will
2014-11-05 16:42:40 +08:00
delete a user's profile (say ``http://example.com/user/delete``). If an
2010-08-03 00:07:10 +08:00
attacker now creates a page that sends a post request to that page with
2016-03-12 01:06:00 +08:00
some JavaScript they just have to trick some users to load that page and
their profiles will end up being deleted.
2010-06-11 05:06:54 +08:00
Imagine you were to run Facebook with millions of concurrent users and
someone would send out links to images of little kittens. When users
would go to that page, their profiles would get deleted while they are
2010-06-11 05:06:54 +08:00
looking at images of fluffy cats.
How can you prevent that? Basically for each request that modifies
content on the server you would have to either use a one-time token and
store that in the cookie **and** also transmit it with the form data.
After receiving the data on the server again, you would then have to
compare the two tokens and ensure they are equal.
2010-06-11 05:06:54 +08:00
Why does Flask not do that for you? The ideal place for this to happen is
the form validation framework, which does not exist in Flask.
2010-06-11 05:06:54 +08:00
.. _security-json:
2010-06-11 05:06:54 +08:00
JSON Security
-------------
In Flask 0.10 and lower, :func:`~flask.jsonify` did not serialize top-level
arrays to JSON. This was because of a security vulnerability in ECMAScript 4.
ECMAScript 5 closed this vulnerability, so only extremely old browsers are
still vulnerable. All of these browsers have `other more serious
vulnerabilities
<https://github.com/pallets/flask/issues/248#issuecomment-59934857>`_, so
this behavior was changed and :func:`~flask.jsonify` now supports serializing
arrays.
2017-05-23 11:52:02 +08:00
Security Headers
----------------
Browsers recognize various response headers in order to control security. We
recommend reviewing each of the headers below for use in your application.
The `Flask-Talisman`_ extension can be used to manage HTTPS and the security
headers for you.
.. _Flask-Talisman: https://github.com/GoogleCloudPlatform/flask-talisman
2017-05-23 11:52:02 +08:00
HTTP Strict Transport Security (HSTS)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
2017-05-23 11:52:02 +08:00
Tells the browser to convert all HTTP requests to HTTPS, preventing
man-in-the-middle (MITM) attacks. ::
2017-05-23 11:52:02 +08:00
2017-07-17 03:07:25 +08:00
response.headers['Strict-Transport-Security'] = 'max-age=31536000; includeSubDomains'
2017-05-23 11:52:02 +08:00
- https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
2017-05-23 11:52:02 +08:00
.. _security-csp:
Content Security Policy (CSP)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
2017-05-23 11:52:02 +08:00
Tell the browser where it can load various types of resource from. This header
should be used whenever possible, but requires some work to define the correct
policy for your site. A very strict policy would be::
2017-05-23 11:52:02 +08:00
response.headers['Content-Security-Policy'] = "default-src 'self'"
2017-05-23 11:52:02 +08:00
- https://csp.withgoogle.com/docs/index.html
- https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
2017-05-23 11:52:02 +08:00
X-Content-Type-Options
~~~~~~~~~~~~~~~~~~~~~~
2017-05-23 11:52:02 +08:00
Forces the browser to honor the response content type instead of trying to
detect it, which can be abused to generate a cross-site scripting (XSS)
attack. ::
response.headers['X-Content-Type-Options'] = 'nosniff'
2017-05-23 11:52:02 +08:00
- https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options
2017-05-23 11:52:02 +08:00
X-Frame-Options
~~~~~~~~~~~~~~~
2017-05-23 11:52:02 +08:00
Prevents external sites from embedding your site in an ``iframe``. This
prevents a class of attacks where clicks in the outer frame can be translated
invisibly to clicks on your page's elements. This is also known as
"clickjacking". ::
2017-05-23 11:52:02 +08:00
response.headers['X-Frame-Options'] = 'SAMEORIGIN'
2017-05-23 11:52:02 +08:00
- https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
2017-05-23 11:52:02 +08:00
2018-01-24 07:11:50 +08:00
.. _security-cookie:
Set-Cookie options
~~~~~~~~~~~~~~~~~~
2017-05-23 11:52:02 +08:00
These options can be added to a ``Set-Cookie`` header to improve their
security. Flask has configuration options to set these on the session cookie.
They can be set on other cookies too.
2017-05-23 11:52:02 +08:00
- ``Secure`` limits cookies to HTTPS traffic only.
- ``HttpOnly`` protects the contents of cookies from being read with
JavaScript.
2018-01-24 07:11:50 +08:00
- ``SameSite`` restricts how cookies are sent with requests from
external sites. Can be set to ``'Lax'`` (recommended) or ``'Strict'``.
``Lax`` prevents sending cookies with CSRF-prone requests from
external sites, such as submitting a form. ``Strict`` prevents sending
cookies with all external requests, including following regular links.
2017-05-23 11:52:02 +08:00
::
2017-05-23 11:52:02 +08:00
app.config.update(
SESSION_COOKIE_SECURE=True,
SESSION_COOKIE_HTTPONLY=True,
2018-01-24 07:11:50 +08:00
SESSION_COOKIE_SAMESITE='Lax',
)
2018-01-24 07:11:50 +08:00
response.set_cookie('username', 'flask', secure=True, httponly=True, samesite='Lax')
2017-05-23 11:52:02 +08:00
Specifying ``Expires`` or ``Max-Age`` options, will remove the cookie after
the given time, or the current time plus the age, respectively. If neither
option is set, the cookie will be removed when the browser is closed. ::
# cookie expires after 10 minutes
response.set_cookie('snakes', '3', max_age=600)
2017-08-01 23:47:56 +08:00
For the session cookie, if :attr:`session.permanent <flask.session.permanent>`
is set, then :data:`PERMANENT_SESSION_LIFETIME` is used to set the expiration.
Flask's default cookie implementation validates that the cryptographic
signature is not older than this value. Lowering this value may help mitigate
replay attacks, where intercepted cookies can be sent at a later time. ::
app.config.update(
PERMANENT_SESSION_LIFETIME=600
)
@app.route('/login', methods=['POST'])
def login():
...
session.clear()
session['user_id'] = user.id
session.permanent = True
...
2017-08-01 23:47:56 +08:00
Use :class:`itsdangerous.TimedSerializer` to sign and validate other cookie
values (or any values that need secure signatures).
- https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
- https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie
2017-05-23 11:52:02 +08:00
2018-01-24 07:11:50 +08:00
.. _samesite_support: https://caniuse.com/#feat=same-site-cookie-attribute
2020-06-08 07:45:31 +08:00
Copy/Paste to Terminal
----------------------
Hidden characters such as the backspace character (``\b``, ``^H``) can
cause text to render differently in HTML than how it is interpreted if
`pasted into a terminal <https://security.stackexchange.com/q/39118>`__.
2020-06-01 04:51:00 +08:00
For example, ``import y\bose\bm\bi\bt\be\b`` renders as
2020-06-08 07:45:31 +08:00
``import yosemite`` in HTML, but the backspaces are applied when pasted
into a terminal, and it becomes ``import os``.
2020-06-01 04:51:00 +08:00
2020-06-08 07:45:31 +08:00
If you expect users to copy and paste untrusted code from your site,
such as from comments posted by users on a technical blog, consider
applying extra filtering, such as replacing all ``\b`` characters.
2020-06-01 04:51:00 +08:00
.. code-block:: python
body = body.replace("\b", "")
2020-06-08 07:45:31 +08:00
Most modern terminals will warn about and remove hidden characters when
pasting, so this isn't strictly necessary. It's also possible to craft
dangerous commands in other ways that aren't possible to filter.
Depending on your site's use case, it may be good to show a warning
about copying code in general.