python.django.security.audit.xss.template-blocktranslate-no-escape.template-blocktranslate-no-escape

Community Favorite
profile photo of semgrepsemgrep
Author
48,153
Download Count*

Translated strings will not be escaped when rendered in a template. This leads to a vulnerability where translators could include malicious script tags in their translations. Consider using force_escape to explicitly escape a translated text.

Run Locally

Run in CI

Defintion

rules:
  - id: template-blocktranslate-no-escape
    languages:
      - generic
    severity: INFO
    message: Translated strings will not be escaped when rendered in a template.
      This leads to a vulnerability where translators could include malicious
      script tags in their translations. Consider using `force_escape` to
      explicitly escape a translated text.
    patterns:
      - pattern-either:
          - pattern: |
              {% blocktranslate...%}
          - pattern: |
              {% blocktrans...%}
      - pattern-not-inside: |
          {%...filter...force_escape...%}
          ...
          ...
          ...
          ...
          ...
          ...
          ...
          ...
          ...
          ...
          {%...endfilter...%}
    metadata:
      cwe:
        - "CWE-79: Improper Neutralization of Input During Web Page Generation
          ('Cross-site Scripting')"
      owasp:
        - A07:2017 - Cross-Site Scripting (XSS)
        - A03:2021 - Injection
      references:
        - https://edx.readthedocs.io/projects/edx-developer-guide/en/latest/preventing_xss/preventing_xss_in_django_templates.html#html-escaping-translations-in-django-templates
        - https://docs.djangoproject.com/en/3.1/topics/i18n/translation/#internationalization-in-template-code
      category: security
      technology:
        - django
      cwe2022-top25: true
      cwe2021-top25: true
      subcategory:
        - audit
      likelihood: LOW
      impact: MEDIUM
      confidence: LOW
      license: Commons Clause License Condition v1.0[LGPL-2.1-only]
      vulnerability_class:
        - Cross-Site-Scripting (XSS)

Examples

template-blocktranslate-no-escape.html

<title>
<!-- ruleid: template-blocktranslate-no-escape -->
{% blocktranslate %}
Hello world
{% endblocktranslate %}
</title>

<div>
<!-- ruleid: template-blocktranslate-no-escape -->
{% blocktrans %}Foo bar{% endblocktrans %}
</div>

<div>
{% filter force_escape %}
    <!-- ok: template-blocktranslate-no-escape -->
    {% blocktranslate %}Foo bar{% endblocktranslate %}
{% endfilter %}
</div>