mirror of
git://git.openembedded.org/meta-openembedded
synced 2026-04-03 03:19:23 +00:00
Details: https://nvd.nist.gov/vuln/detail/CVE-2022-24801 Pick the commits from the pull request that is referenced by the NVD report. (The full set is consisting of 13 patches, but the ones that only updated news/readme/typo fixes in comments were not backported) Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
133 lines
4.4 KiB
Diff
133 lines
4.4 KiB
Diff
From 832a878c9c324ad23dde6cf16520b7768c1a8c5c Mon Sep 17 00:00:00 2001
|
|
From: Tom Most <twm@freecog.net>
|
|
Date: Sat, 5 Mar 2022 23:26:55 -0800
|
|
Subject: [PATCH] Some tests for GHSA-c2jg-hw38-jrqq
|
|
|
|
Upstream-Status: Backport [https://github.com/twisted/twisted/commit/22b067793cbcd0fb5dee04cfd9115fa85a7ca110]
|
|
CVE: CVE-2022-24801
|
|
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
|
|
---
|
|
src/twisted/web/test/test_http.py | 102 ++++++++++++++++++++++++++++++
|
|
1 file changed, 102 insertions(+)
|
|
|
|
diff --git a/src/twisted/web/test/test_http.py b/src/twisted/web/test/test_http.py
|
|
index 86c85d2..0549ed0 100644
|
|
--- a/src/twisted/web/test/test_http.py
|
|
+++ b/src/twisted/web/test/test_http.py
|
|
@@ -1843,6 +1843,56 @@ class ParsingTests(unittest.TestCase):
|
|
[b"t \ta \tb"],
|
|
)
|
|
|
|
+ def test_headerStripWhitespace(self):
|
|
+ """
|
|
+ Leading and trailing space and tab characters are stripped from
|
|
+ headers. Other forms of whitespace are preserved.
|
|
+
|
|
+ See RFC 7230 section 3.2.3 and 3.2.4.
|
|
+ """
|
|
+ processed = []
|
|
+
|
|
+ class MyRequest(http.Request):
|
|
+ def process(self):
|
|
+ processed.append(self)
|
|
+ self.finish()
|
|
+
|
|
+ requestLines = [
|
|
+ b"GET / HTTP/1.0",
|
|
+ b"spaces: spaces were stripped ",
|
|
+ b"tabs: \t\ttabs were stripped\t\t",
|
|
+ b"spaces-and-tabs: \t \t spaces and tabs were stripped\t \t",
|
|
+ b"line-tab: \v vertical tab was preserved\v\t",
|
|
+ b"form-feed: \f form feed was preserved \f ",
|
|
+ b"",
|
|
+ b"",
|
|
+ ]
|
|
+
|
|
+ self.runRequest(b"\n".join(requestLines), MyRequest, 0)
|
|
+ [request] = processed
|
|
+ # All leading and trailing whitespace is stripped from the
|
|
+ # header-value.
|
|
+ self.assertEqual(
|
|
+ request.requestHeaders.getRawHeaders(b"spaces"),
|
|
+ [b"spaces were stripped"],
|
|
+ )
|
|
+ self.assertEqual(
|
|
+ request.requestHeaders.getRawHeaders(b"tabs"),
|
|
+ [b"tabs were stripped"],
|
|
+ )
|
|
+ self.assertEqual(
|
|
+ request.requestHeaders.getRawHeaders(b"spaces-and-tabs"),
|
|
+ [b"spaces and tabs were stripped"],
|
|
+ )
|
|
+ self.assertEqual(
|
|
+ request.requestHeaders.getRawHeaders(b"line-tab"),
|
|
+ [b"\v vertical tab was preserved\v"],
|
|
+ )
|
|
+ self.assertEqual(
|
|
+ request.requestHeaders.getRawHeaders(b"form-feed"),
|
|
+ [b"\f form feed was preserved \f"],
|
|
+ )
|
|
+
|
|
def test_tooManyHeaders(self):
|
|
"""
|
|
C{HTTPChannel} enforces a limit of C{HTTPChannel.maxHeaders} on the
|
|
@@ -2407,6 +2457,58 @@ Hello,
|
|
]
|
|
)
|
|
|
|
+ def test_contentLengthMalformed(self):
|
|
+ """
|
|
+ A request with a non-integer C{Content-Length} header fails with a 400
|
|
+ response without calling L{Request.process}.
|
|
+ """
|
|
+ self.assertRequestRejected(
|
|
+ [
|
|
+ b"GET /a HTTP/1.1",
|
|
+ b"Content-Length: MORE THAN NINE THOUSAND!",
|
|
+ b"Host: host.invalid",
|
|
+ b"",
|
|
+ b"",
|
|
+ b"x" * 9001,
|
|
+ ]
|
|
+ )
|
|
+
|
|
+ def test_contentLengthTooPositive(self):
|
|
+ """
|
|
+ A request with a C{Content-Length} header that begins with a L{+} fails
|
|
+ with a 400 response without calling L{Request.process}.
|
|
+
|
|
+ This is a potential request smuggling vector: see GHSA-c2jg-hw38-jrqq.
|
|
+ """
|
|
+ self.assertRequestRejected(
|
|
+ [
|
|
+ b"GET /a HTTP/1.1",
|
|
+ b"Content-Length: +100",
|
|
+ b"Host: host.invalid",
|
|
+ b"",
|
|
+ b"",
|
|
+ b"x" * 100,
|
|
+ ]
|
|
+ )
|
|
+
|
|
+ def test_contentLengthNegative(self):
|
|
+ """
|
|
+ A request with a C{Content-Length} header that is negative fails with
|
|
+ a 400 response without calling L{Request.process}.
|
|
+
|
|
+ This is a potential request smuggling vector: see GHSA-c2jg-hw38-jrqq.
|
|
+ """
|
|
+ self.assertRequestRejected(
|
|
+ [
|
|
+ b"GET /a HTTP/1.1",
|
|
+ b"Content-Length: -100",
|
|
+ b"Host: host.invalid",
|
|
+ b"",
|
|
+ b"",
|
|
+ b"x" * 200,
|
|
+ ]
|
|
+ )
|
|
+
|
|
def test_duplicateContentLengthsWithPipelinedRequests(self):
|
|
"""
|
|
Two pipelined requests, the first of which includes multiple
|