Reputation: 2109
From a web2py controller, I'm returning something like:
raise HTTP(404,"Sorry, could not find {}".format(request.args[0]))
But is that dangerous? What if someone calls the page with a malicious args string? Could they inject html into my return page and construct a page on my server that contains their html content? What if they inject a huge amount of data into args[0] - will it DoS my server?
Upvotes: 0
Views: 97
Reputation: 25536
To be safe, just do:
raise HTTP(404, xmlescape("Sorry, could not find {}".format(request.args[0])))
xmlescape()
will escape the text, so there will be no HTML/JS for the browser to display.
Upvotes: 1