Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

html/template: add support for template strings (backticks) #9200

Open
gopherbot opened this issue Dec 3, 2014 · 45 comments
Open

html/template: add support for template strings (backticks) #9200

gopherbot opened this issue Dec 3, 2014 · 45 comments
Labels
NeedsDecision Feedback is required from experts, contributors, and/or the community before a change can be made.
Milestone

Comments

@gopherbot
Copy link

by opennota:

ES6 specifies a new language feature called "Template Strings" (often also
referred to as "Quasi Literals" alongside multi-line strings and others). This
allows to execute arbitrary JavaScript code without using parenthesis but
back-ticks instead. Inside back-tick delimited strings, placeholders such as
${} can wrap executable code.

http://play.golang.org/p/nBEneuxHNj

If you open the output of the above program in a modern browser (e.g., recently released
Mozilla Firefox 34 supports template strings), it will happily execute alert(1).

References:

https://people.mozilla.org/~jorendorff/es6-draft.html
https://html5sec.org/#140
https://html5sec.org/#141
@ianlancetaylor
Copy link
Contributor

Comment 1:

Labels changed: added repo-main, release-go1.5.

@robpike
Copy link
Contributor

robpike commented Dec 4, 2014

Comment 2:

Just what JavaScript needed, a new way to execute arbitrary code on the client machine.

Owner changed to mikesamuel.

Status changed to Accepted.

@gopherbot
Copy link
Author

Comment 3 by mikesamuel:

I really should have seen that coming since I wrote the spec strawman:
https://code.google.com/p/js-quasis-libraries-and-repl/
This doesn't actually introduce a new execution vector for client-side code since the
backticks are significant inside a block of JavaScript code, not inside HTML.  Automatic
interpretation of '{{' inside <template> elements does that.  (sigh)
Will fix.

@bradfitz bradfitz modified the milestone: Go1.5 Dec 16, 2014
@rsc rsc removed accepted labels Apr 14, 2015
@rsc rsc modified the milestones: Go1.6Early, Go1.5 Jul 21, 2015
@ianlancetaylor ianlancetaylor modified the milestones: Go1.6, Go1.6Early Dec 11, 2015
@rsc rsc modified the milestones: Unplanned, Go1.6 Dec 17, 2015
@mcfedr
Copy link

mcfedr commented Feb 9, 2017

Might also be an issue inside of JS attributes, as in this demo: https://play.golang.org/p/iahSK9oqLc - pops up alert in modern browsers

@mvdan mvdan changed the title html/template: doesn't properly escape content inside backticks html/template: add support for template strings (backticks) Dec 25, 2018
@mvdan
Copy link
Member

mvdan commented Dec 25, 2018

#29406 was about malformed template output since backticks aren't parsed properly. I've re-titled this issue to be about the overall support of this ES6 feature, and closed the newer issue as a duplicate.

I'm marking it as NeedsDecision, just in case anyone disagrees with adding this feature. It's part of the JS standard, so as long as html/template follows that, it seems to me like this issue should be fixed.

@mvdan mvdan added the NeedsDecision Feedback is required from experts, contributors, and/or the community before a change can be made. label Dec 25, 2018
@hundt
Copy link

hundt commented Mar 19, 2019

I'm not sure if anyone else is working on this, but I have given it some thought and I thought I'd share in case anyone else has some insight.

First, some notes about template literals:

  • They are enclosed by backticks.
  • They can contain "placeholders", which are marked by "${" on the left side and "}" on the right side, and which can contain any valid JS expression.
  • "Valid JS expressions" include template literals and things containing them, so they can be nested: `${`${`${1}`}`}` is valid. And this is a common use case, not an obscure edge case.
  • The non-placebolder parts of the template literals are treated as string literals.

I am not super-familiar with this codebase but to me there are two main issues that need to be solved:

  1. Detecting when we are in a template literal or placeholder expression in a Go template, so that we can escape properly, and also so that we don't get confused and parse the rest of the Go template incorrectly (as in html/template: ``literal cut off #29406)
  2. Detecting when the data passed to Execute will be interpreted as a placeholder, allowing arbitrary code execution (as in the example given when this issue was opened).

I think if we can solve problem 1 then problem 2 is straightforward: simply replace "$" with "\x24" when inserting into a template-literal context. In the regular javascript context (including the placeholder context) any data with a backtick would already have quotes wrapped around it so it would not be considered a template literal.

Solving problem 1 is a harder given the approach of the existing code, which steps through the characters of the JS code but doesn't really parse the JS. In the code, the state of being in regular Javascript code is called stateJS. Let's suppose we add a new state stateTL for being in a template literal. Then "`" marks a transition stateJS -> stateTL or stateTL -> stateJS. And "${" also marks a transition stateTL -> stateJS. But "}" may mark a transition from stateJS -> stateTL (if it is marking the end of a placeholder) or it might just be the end of a code block. So we will need to know whether our current stateJS state is part of a placeholder inside of a template literal or not. And since template literals can nest we'll need to know how many levels deep we are.

I implemented the above as my initial solution, but then I realized it still isn't quite right, because the placeholder expression could contain "}"s. For example, `${function(){return 1}()}` is a valid template literal. So when inside a placeholder expression we also need to keep track of how many blocks deep we are, so that we know when the expression finally ends. And, since we could be multiple template literals deep, I suppose we need a stack of block depths representing how deep we are inside each placeholder expression along the way. Otherwise, given the expression `${function(){if (1>0) {return `${1}`} else {return 2}}()}`, when we exit out of the innermost template literal ("`${1}`") into the enclosing placeholder expression, we won't know if the following "}" closes that placeholder expression or not.

At this point it seems to me that I am thinking of a level of complexity beyond how the JS-handing code currently works. So I'm wondering if I'm missing a simpler solution, or if these template literals complicate the situation enough that it is simply necessary to have a more complex Javascript "parser" for html/template to work with them.

@FiloSottile
Copy link
Contributor

/cc @empijei

@empijei
Copy link
Contributor

empijei commented Mar 20, 2019

Thanks @hundt for your analysis.

It seems to me that fixing this issue would require this package to implement a JS parser to keep track of the current context. If not a fully-fledged JS parser it would at least need to correctly understand the context-switch between Template Literals and JavaScript context.

While this is possible, it would complicate the current logic more than I'm comfortable with, and seems very tricky to get right. I played with this a little and stuff like the following line came up:

var tmpl = `"${a="`${"}}`;

My opinion would be to not support this and disallow JS template literals. This would need the documentation to be updated accordingly.

I have some ideas on how to do this:

  1. Accept backtick-delimited strings just to have multiline strings or easier quotes like Go does, and encode ${ to prevent execution;
  2. Bail out and warn users that backticks are not supported at parse time;
  3. Do not sanitize, nor change change anything that is in a template literal, but this is trickier and more dangerous and still needs decision on what to do when a variable is interpolated in such context;

I would honestly already update the docs to say that we currently do not support template literals.

We also need to decide what to do for cases like

alert`1`

Which are valid JS function calls.

@mikesamuel do you have a different opinion?

@hundt and @eternal-flame-AD what is the use case for JS template literals inside html templates? (I can guess hypothetical ones but I'm interested in your concrete one if you can publish it)

@hundt
Copy link

hundt commented Mar 20, 2019

A few notes:

I played with this a little and stuff like the following line came up:

var tmpl = `"${a="`${"}}`;

I think this kind of thing is pretty well handled by the internal state machine once it understands the backticks, because it already knows that characters inside quotes lose the special meaning they have outside quotes. I tried this input with my initial implementation that I mentioned above, with some logging to indicate state transitions, and it did the right thing:

Parse "var tmpl = `": {stateJSTLStr delimNone urlPartNone jsCtxRegexp jsTLDepth=1 attrNone elementScript <nil>}
Parse ""${": {stateJS delimNone urlPartNone jsCtxDivOp jsTLDepth=1 attrNone elementScript <nil>}
Parse "a="": {stateJSDqStr delimNone urlPartNone jsCtxRegexp jsTLDepth=1 attrNone elementScript <nil>}
Parse "`${"": {stateJS delimNone urlPartNone jsCtxDivOp jsTLDepth=1 attrNone elementScript <nil>}
Parse "}": {stateJSTLStr delimNone urlPartNone jsCtxRegexp jsTLDepth=1 attrNone elementScript <nil>}
Parse "}`": {stateJS delimNone urlPartNone jsCtxDivOp jsTLDepth=0 attrNone elementScript <nil>}

Here stateJSTLStr is the new state I added for being in a template literal string, and jsTLDepth indicates how many template literals deep you are.

We also need to decide what to do for cases like

alert`1`

Which are valid JS function calls.

I'm not sure it would be necessary to explicitly handle this. As long as backticks are implemented, I believe the current code will correctly understand that the "alert" part is in the normal Javascript context and we leave that context with the backtick.

@hundt and @eternal-flame-AD what is the use case for JS template literals inside html templates? (I can guess hypothetical ones but I'm interested in your concrete one if you can publish it)

Honestly in my case it was just a case of being lazy and using an embedded script with rendering logic inside of it on a page that also used html/template to inject in some server-side variables. My experience with this issue and my later reading of #27926 has convinced me that this was a bad approach, and I refactored my code to put substantially all of the Javascript into separately loaded modules which no longer pass through any server-side templating, which is what I probably should have done in the first place.

Given that it is probably not good practice to do what I had been doing, in my opinion it would be reasonable not to support HTML templates with JS template literals (and fail when it encounters them), or to support it only with template literals formatted in the subset of possible ways that html/template can understand (provided it can reliably detect and error out when it encounters an unsupported situation). To me the biggest problem is that the API currently promises "safe" HTML but does not deliver it. Better to simply fail in that situation.

In case it is of interest: I gathered that Google's closure-templates library is well-regarded, so I checked what they do. Just like html/template, they do a character-by-character "context" analysis of Javascript that falls short of fully parsing it. Their approach to template literals appears to be identical to the initial implementation I described above, including the failure to deal with braces inside ${. However, their template parser fails at the parsing stage of such a template, either due to an additional bug or by design (I'm not sure which).

@empijei
Copy link
Contributor

empijei commented Mar 20, 2019

my initial implementation that I mentioned above

Do you want to share a link to the patched code?

To me the biggest problem is that the API currently promises "safe" HTML but does not deliver it. Better to simply fail in that situation.

I agree. Plus I see little to no reason to nest Go and JS templates.

The solution I'm more inclined to implement and document is to just have a stateJSTLStr and encode $`\ and other potentially dangerous characters (this would probably require some thoughts on what to encode/filter and how).

@hundt if we can get to an agreement on this would you like to work on a CL to address it?

@hundt
Copy link

hundt commented Mar 20, 2019

my initial implementation that I mentioned above

Do you want to share a link to the patched code?

Ah, sorry, wasn't sure the right way to share it without requesting a PR. Here's a patch, does that work for you? https://gist.github.com/hundt/fc27e649a01722a8466987b0f102fe5d

The solution I'm more inclined to implement and document is to just have a stateJSTLStr and encode $`\ and other potentially dangerous characters (this would probably require some thoughts on what to encode/filter and how).

I think if we are going to support template literals then we would need to support ${} and nested template literals (in the HTML template, not in the input variables), since my impression is that many (most?) practical uses of template literals involve nesting (because that is how you do conditionals and loops). I believe we can do that without making my implementation much more complicated if we just fail when we encounter { (without the $) inside ${}, to avoid the problem of not knowing when the ${} ends. (I'm assuming there's a way to error out and abort when we see certain characters instead of doing a state transition but I haven't spent enough time looking at the code to be sure.)

@hundt if we can get to an agreement on this would you like to work on a CL to address it?

I'm interested but I will likely not be available in the short term. After another day or so I will likely have little time to work on this for at least two weeks. But if you don't mind waiting I can probably pick it up then.

@hundt
Copy link

hundt commented Mar 20, 2019

In case it helps illustrate some of the issues, here are some test cases indicating potential failure modes that allow code injection:

https://play.golang.org/p/61h5vn53A4H

The current code fails the first, second, and fourth tests because it does not understand template literals.

My patch fails the fifth test because it understands template literals but not braces inside ${}

@hundt
Copy link

hundt commented Oct 29, 2020

@empijei That implementation is broken in the same way as my implementation from #9200 (comment) and the one in closure-templates: it fails to distinguish between a closing brace that ends an interpolation and one that ends a code block. For example:

`${(function(){return 1;})()`

is considered not to be an unclosed template literal by that code.

@empijei
Copy link
Contributor

empijei commented Oct 29, 2020

Right. I didn't notice that, good catch (I reported it to the maintainers of that package).

@empijei
Copy link
Contributor

empijei commented Oct 29, 2020

A recap for this issue so far.

We have several possibilities in order of backward-compatibility breakage and security improvement:

  1. Do nothing and clearly document this issue.
  2. Implement a best-effort fix that tries to detect unbalanced templates (but will get it wrong in a small set of cases). By doing so we allows some JS templating, but we would still forbid Go interpolation in JS templates. Some XSS might still slip through but it would be a very remote corner case.
  3. Implement a fully-baked fix, which will require us to implement a somewhat complex parser for this syntax(note that this package parser is already quite complicated). This would also allow some JS templating but we would still forbid Go interpolation in JS templates. This solution might look like a good one but it requires a significant amount of work (and maintenance) and still has some breaking potential.
  4. Implement something simple that just matches opening and closing backticks, but that detects mixed templates and just errors if a ${ is encountered after an opening `. This was described here and would still allow backticks to be used to delimit strings (no templating functionality).
  5. Straight out ban template literals and bail out as soon as we see a backtick.

All of the last four would address the "url breaks if in backticks" case.

Did I miss anything?

@hundt
Copy link

hundt commented Oct 29, 2020

To be a little more precise, your solution (4) would ban interpolation/placeholders inside template literals but would allow simple template literals (like `string`). I had proposed a solution (5) which was to ban ALL template literals, i.e. bail as soon as you see the `. That would cause further breakage but would also remove the risk of the parser failing to detect an interpolation or being incorrect about where a template literal ends. I don't know enough about JS to know whether that is a real risk (or may become a real risk with future changes to the language). @mikesamuel did not seem very concerned.

@empijei
Copy link
Contributor

empijei commented Oct 30, 2020

Updated, thanks.

@a1gemmel
Copy link

a1gemmel commented Aug 2, 2021

I ran into this today, took me a while to figure it out since one template with javascript backticks was impacted and another was not. It would be great if the html/template documentation mentioned that javascript template strings aren't currently supported. I can open a PR for that if it's wanted.

@rhcarvalho
Copy link
Contributor

Is there any objection to adding a // BUG comment somewhere in html/template describing the current limitation?

A note in the docs, similar to what is in https://pkg.go.dev/reflect#pkg-notes, would possibly have saved me some time and frustration today until I found this open issue.

Looking at the references this issue is getting, I'm sure I'm not the only one bitten by unexpected behavior (I had a URL inside a JS backtick string in a template; seemed to work in the first occurrence, but was treated as comment in the second and broke the script).

@rhcarvalho
Copy link
Contributor

Support for JS template strings changed with #59234 (a security fix).

@ianlancetaylor
Copy link
Contributor

Thanks. I'm closing this issue as fixed, or avoided, by #59234. Please comment if you disagree.

@ianlancetaylor ianlancetaylor closed this as not planned Won't fix, can't repro, duplicate, stale Apr 4, 2023
@hundt
Copy link

hundt commented Apr 4, 2023

@ianlancetaylor I do not think this completely fixes the issue. Consider this program

package main

import (
	"bytes"
	"fmt"
	"html/template"
)

func main() {
	t := template.Must(template.New("test").Parse("<script>var v = `${function(){return `{{.V}}+1`}()}`;</script>"))
	buf := new(bytes.Buffer)
	err := t.Execute(buf, map[string]string{"V": "${alert(1)}"})
	if err != nil {
		panic(err)
	}
	fmt.Printf("%s", buf)
}

Go's JS "state machine" incorrectly thinks that "{{.V}}" appears outside of a JS template literal and escapes it as if it were the javascript context (by just adding quotes around it). As a result the output of this program is

<script>var v = `${function(){return `"${alert(1)}"+1`}()}`;</script>

which, if inserted as HTML in a web page, will run the alert function.

@ianlancetaylor
Copy link
Contributor

@hundt Thanks.

@ianlancetaylor ianlancetaylor reopened this Apr 4, 2023
@wbyao
Copy link

wbyao commented Apr 8, 2023

@hundt Thanks.

@ianlancetaylor Should this issue be marked as Security and associated with CVE-2023-24538

@gopherbot
Copy link
Author

Change https://go.dev/cl/484075 mentions this issue: html/template: treat nested template literals properly

@hundt
Copy link

hundt commented Apr 12, 2023

@rolandshoemaker Since I'm interested I took a look at that CL. It looks like it sort of extends the simple state machine with one more state ("inside a string interpolation"). However, as discussed above, knowing when a string interpolation ends is not as simple as looking for the next }. The string interpolation can contain arbitrary javascript, including for example object literals or flow control with braces. I haven't run the proposed code myself but I suspect it would be straightforward to extend the example from the test case to fool this new implementation.

@rolandshoemaker
Copy link
Member

Bah, that is a very good point. I keep looking for a cheat here, and it really seems like without a significantly more complex JS state machine (which I don't think we can really justify sinking time into), there isn't a clear solution here.

At some point I think we probably have to draw a line, and say that, as is documented, template authors are generally trusted. We can attempt to prevent them from doing things we consider dangerous, but there is a limit to what we can prevent them from doing by working around the restrictions we put in place. I think what we have now (just disabling actions in basic template literals) and perhaps the suggested change (disallow actions in nested template literals) is perhaps enough? 🤷

@hundt
Copy link

hundt commented Apr 13, 2023

@rolandshoemaker I'm not sure it's about trusting template authors. To me the main issue is that template authors may, without realizing it, provide a template that html/template misparses, resulting in incorrect rendering and/or incorrect escaping. This is how I encountered this issue. The library promises to do safe interpolation into Javascript, but can't deliver on that promise, unless the caller respects some parsing limitations that they may not be aware of.

The initial fix makes it less likely that template authors will run into a problem, and the latest CL would presumably make it even less likely, but still there is some undocumented limit to how complex your Javascript can be before this breaks down in unpredictable ways. Personally I wouldn't want to use such a library because I wouldn't want to have to try to keep this information in my head. And indeed I did stop putting any Javascript through html/template once I discovered this issue in 2019, and I don't think I will ever do it again, regardless of what code changes are made, because it is not necessary and seems like asking for trouble now that I understand how difficult the problem is. I think it is better to render templates client-side using something like Lit, where the template is interpreted by the browser itself, and the variables are inserted into the DOM tree as text instead of being interpreted by the browser (so no escaping is necessary).

That all said, as far as I can tell other popular template libraries (closure, safehtml/template) use roughly the approach in your latest CL, so maybe that is generally considered a good balance.

@dwrz
Copy link

dwrz commented Apr 22, 2023

Yesterday, I had to help rescue a production site that broke due to the introduction of errJSTmplLit. The site used a template to generate HTML {{ range .Dates }}{{ template "date-row" . }}{{ end }}, but also for a JavaScript variable:

<script>
  const dateRow = `{{ template "date-row" . }}`
  
  // . . . 
  
 const addDateRange = () => {
   const row = document.createElement('tr');
   row.innerHTML = dateRow;

   const dates = document.getElementById('dates');
   dates.appendChild(row);
 };
</script>

I appreciate the security fix and all the work on this issue, and know there are no guarantees for backward compatibility for security fixes. The site would also have kept working if golang:latest hadn't been used to build the service's image. However, I wanted to provide some insight from the field that changes to this package can result in runtime bugs that are harder to catch -- if there is a way to make the consequences clearer in a release, it would be appreciated!

If I can "throw out a brick to attract jade" -- the main reason backticks were used in this case was for a multi-line string. I would be fine with no support for template literals, but would be grateful for some programmatic way of handling multi-line strings.

@rolandshoemaker
Copy link
Member

We've discussed this internally and come to the conclusion that with the current state of the very basic JS parser state machine we currently have in the template package, we cannot reasonably handle the complex cases @hundt et al have brought up (as evidenced by the same issues occurring in the significantly more complex google/safehtml implementation).

Rather than adding a partial fix (such as the one suggested in my CL above, in the same vein to what google/safehtml currently implements), we are leaning towards simply detecting these particular complex cases (i.e. anything beyond `${}` in a template literal) and refusing to parse them, since we are realistically unable to handle them safely.

This will obviously break some use cases, but I think it does strike a reasonable balance between supporting the common use cases of JS template literals and preventing unsafe, hard to understand behavior (i.e. in many current cases it is likely extremely confusing how a Go action inside of a template literal will currently be treated).

@ianlancetaylor
Copy link
Contributor

@rolandshoemaker I don't know enough to have an opinion about what we should do, but I do know that what you are describing should take the form of a new proposal. Thanks.

@celesteking

This comment was marked as abuse.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
NeedsDecision Feedback is required from experts, contributors, and/or the community before a change can be made.
Projects
None yet
Development

No branches or pull requests