| Security Considerations |
| ======================= |
|
|
| Web applications usually face all kinds of security problems and it's very |
| hard to get everything right. Flask tries to solve a few of these things |
| for you, but there are a couple more you have to take care of yourself. |
|
|
| .. _security-xss: |
|
|
| Cross-Site Scripting (XSS) |
| |
|
|
| Cross site scripting is the concept of injecting arbitrary HTML (and with |
| it JavaScript) into the context of a website. To remedy this, developers |
| have to properly escape text so that it cannot include arbitrary HTML |
| tags. For more information on that have a look at the Wikipedia article |
| on `Cross-Site Scripting |
| <https://en.wikipedia.org/wiki/Cross-site_scripting>`_. |
|
|
| Flask configures Jinja2 to automatically escape all values unless |
| explicitly told otherwise. This should rule out all XSS problems caused |
| in templates, but there are still other places where you have to be |
| careful: |
|
|
| - generating HTML without the help of Jinja2 |
| - calling :class:`~flask.Markup` on data submitted by users |
| - sending out HTML from uploaded files, never do that, use the |
| ``Content-Disposition: attachment`` header to prevent that problem. |
| - sending out textfiles from uploaded files. Some browsers are using |
| content-type guessing based on the first few bytes so users could |
| trick a browser to execute HTML. |
|
|
| Another thing that is very important are unquoted attributes. While |
| Jinja2 can protect you from XSS issues by escaping HTML, there is one |
| thing it cannot protect you from: XSS by attribute injection. To counter |
| this possible attack vector, be sure to always quote your attributes with |
| either double or single quotes when using Jinja expressions in them: |
|
|
| .. sourcecode:: html+jinja |
|
|
| <input value="{{ value }}"> |
|
|
| Why is this necessary? Because if you would not be doing that, an |
| attacker could easily inject custom JavaScript handlers. For example an |
| attacker could inject this piece of HTML+JavaScript: |
|
|
| .. sourcecode:: html |
|
|
| onmouseover=alert(document.cookie) |
|
|
| When the user would then move with the mouse over the input, the cookie |
| would be presented to the user in an alert window. But instead of showing |
| the cookie to the user, a good attacker might also execute any other |
| JavaScript code. In combination with CSS injections the attacker might |
| even make the element fill out the entire page so that the user would |
| just have to have the mouse anywhere on the page to trigger the attack. |
|
|
| There is one class of XSS issues that Jinja's escaping does not protect |
| against. The ``a`` tag's ``href`` attribute can contain a `javascript:` URI, |
| which the browser will execute when clicked if not secured properly. |
|
|
| .. sourcecode:: html |
|
|
| <a href="{{ value }}">click here</a> |
| <a href="javascript:alert('unsafe');">click here</a> |
|
|
| To prevent this, you'll need to set the :ref:`security-csp` response header. |
|
|
| Cross-Site Request Forgery (CSRF) |
| |
|
|
| Another big problem is CSRF. This is a very complex topic and I won't |
| outline it here in detail just mention what it is and how to theoretically |
| prevent it. |
|
|
| If your authentication information is stored in cookies, you have implicit |
| state management. The state of "being logged in" is controlled by a |
| cookie, and that cookie is sent with each request to a page. |
| Unfortunately that includes requests triggered by 3rd party sites. If you |
| don't keep that in mind, some people might be able to trick your |
| application's users with social engineering to do stupid things without |
| them knowing. |
|
|
| Say you have a specific URL that, when you sent ``POST`` requests to will |
| delete a user's profile (say ``http://example.com/user/delete``). If an |
| attacker now creates a page that sends a post request to that page with |
| some JavaScript they just have to trick some users to load that page and |
| their profiles will end up being deleted. |
|
|
| Imagine you were to run Facebook with millions of concurrent users and |
| someone would send out links to images of little kittens. When users |
| would go to that page, their profiles would get deleted while they are |
| looking at images of fluffy cats. |
|
|
| How can you prevent that? Basically for each request that modifies |
| content on the server you would have to either use a one-time token and |
| store that in the cookie **and** also transmit it with the form data. |
| After receiving the data on the server again, you would then have to |
| compare the two tokens and ensure they are equal. |
|
|
| Why does Flask not do that for you? The ideal place for this to happen is |
| the form validation framework, which does not exist in Flask. |
|
|
| .. _security-json: |
|
|
| JSON Security |
| |
|
|
| In Flask 0.10 and lower, :func:`~flask.jsonify` did not serialize top-level |
| arrays to JSON. This was because of a security vulnerability in ECMAScript 4. |
|
|
| ECMAScript 5 closed this vulnerability, so only extremely old browsers are |
| still vulnerable. All of these browsers have `other more serious |
| vulnerabilities |
| <https://github.com/pallets/flask/issues/248#issuecomment-59934857>`_, so |
| this behavior was changed and :func:`~flask.jsonify` now supports serializing |
| arrays. |
|
|
| Security Headers |
| |
|
|
| Browsers recognize various response headers in order to control security. We |
| recommend reviewing each of the headers below for use in your application. |
| The `Flask-Talisman`_ extension can be used to manage HTTPS and the security |
| headers for you. |
|
|
| .. _Flask-Talisman: https://github.com/GoogleCloudPlatform/flask-talisman |
|
|
| HTTP Strict Transport Security (HSTS) |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
|
| Tells the browser to convert all HTTP requests to HTTPS, preventing |
| man-in-the-middle (MITM) attacks. :: |
|
|
| response.headers['Strict-Transport-Security'] = 'max-age=31536000; includeSubDomains' |
|
|
| - https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security |
|
|
| .. _security-csp: |
|
|
| Content Security Policy (CSP) |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
|
| Tell the browser where it can load various types of resource from. This header |
| should be used whenever possible, but requires some work to define the correct |
| policy for your site. A very strict policy would be:: |
|
|
| response.headers['Content-Security-Policy'] = "default-src 'self'" |
|
|
| - https://csp.withgoogle.com/docs/index.html |
| - https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy |
|
|
| X-Content-Type-Options |
| ~~~~~~~~~~~~~~~~~~~~~~ |
|
|
| Forces the browser to honor the response content type instead of trying to |
| detect it, which can be abused to generate a cross-site scripting (XSS) |
| attack. :: |
|
|
| response.headers['X-Content-Type-Options'] = 'nosniff' |
|
|
| - https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options |
|
|
| X-Frame-Options |
| ~~~~~~~~~~~~~~~ |
|
|
| Prevents external sites from embedding your site in an ``iframe``. This |
| prevents a class of attacks where clicks in the outer frame can be translated |
| invisibly to clicks on your page's elements. This is also known as |
| "clickjacking". :: |
|
|
| response.headers['X-Frame-Options'] = 'SAMEORIGIN' |
|
|
| - https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options |
|
|
| .. _security-cookie: |
|
|
| Set-Cookie options |
| ~~~~~~~~~~~~~~~~~~ |
|
|
| These options can be added to a ``Set-Cookie`` header to improve their |
| security. Flask has configuration options to set these on the session cookie. |
| They can be set on other cookies too. |
|
|
| - ``Secure`` limits cookies to HTTPS traffic only. |
| - ``HttpOnly`` protects the contents of cookies from being read with |
| JavaScript. |
| - ``SameSite`` restricts how cookies are sent with requests from |
| external sites. Can be set to ``'Lax'`` (recommended) or ``'Strict'``. |
| ``Lax`` prevents sending cookies with CSRF-prone requests from |
| external sites, such as submitting a form. ``Strict`` prevents sending |
| cookies with all external requests, including following regular links. |
|
|
| :: |
|
|
| app.config.update( |
| SESSION_COOKIE_SECURE=True, |
| SESSION_COOKIE_HTTPONLY=True, |
| SESSION_COOKIE_SAMESITE='Lax', |
| ) |
|
|
| response.set_cookie('username', 'flask', secure=True, httponly=True, samesite='Lax') |
|
|
| Specifying ``Expires`` or ``Max-Age`` options, will remove the cookie after |
| the given time, or the current time plus the age, respectively. If neither |
| option is set, the cookie will be removed when the browser is closed. :: |
|
|
| # cookie expires after 10 minutes |
| response.set_cookie('snakes', '3', max_age=600) |
|
|
| For the session cookie, if :attr:`session.permanent <flask.session.permanent>` |
| is set, then :data:`PERMANENT_SESSION_LIFETIME` is used to set the expiration. |
| Flask's default cookie implementation validates that the cryptographic |
| signature is not older than this value. Lowering this value may help mitigate |
| replay attacks, where intercepted cookies can be sent at a later time. :: |
|
|
| app.config.update( |
| PERMANENT_SESSION_LIFETIME=600 |
| ) |
|
|
| @app.route('/login', methods=['POST']) |
| def login(): |
| ... |
| session.clear() |
| session['user_id'] = user.id |
| session.permanent = True |
| ... |
|
|
| Use :class:`itsdangerous.TimedSerializer` to sign and validate other cookie |
| values (or any values that need secure signatures). |
|
|
| - https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies |
| - https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie |
|
|
| .. _samesite_support: https://caniuse.com/#feat=same-site-cookie-attribute |
|
|
|
|
| HTTP Public Key Pinning (HPKP) |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
|
| This tells the browser to authenticate with the server using only the specific |
| certificate key to prevent MITM attacks. |
|
|
| .. warning:: |
| Be careful when enabling this, as it is very difficult to undo if you set up |
| or upgrade your key incorrectly. |
|
|
| - https://developer.mozilla.org/en-US/docs/Web/HTTP/Public_Key_Pinning |
|
|
|
|
| Copy/Paste to Terminal |
| |
|
|
| Hidden characters such as the backspace character (``\b``, ``^H``) can |
| cause text to render differently in HTML than how it is interpreted if |
| `pasted into a terminal <https://security.stackexchange.com/q/39118>`__. |
|
|
| For example, ``import y\bose\bm\bi\bt\be\b`` renders as |
| ``import yosemite`` in HTML, but the backspaces are applied when pasted |
| into a terminal, and it becomes ``import os``. |
|
|
| If you expect users to copy and paste untrusted code from your site, |
| such as from comments posted by users on a technical blog, consider |
| applying extra filtering, such as replacing all ``\b`` characters. |
|
|
| .. code-block:: python |
|
|
| body = body.replace("\b", "") |
|
|
| Most modern terminals will warn about and remove hidden characters when |
| pasting, so this isn't strictly necessary. It's also possible to craft |
| dangerous commands in other ways that aren't possible to filter. |
| Depending on your site's use case, it may be good to show a warning |
| about copying code in general. |
|
|