Commit 50ffd20b authored by Antoine Pitrou's avatar Antoine Pitrou

Merged revisions 87373,87381 via svnmerge from

svn+ssh://pythondev@svn.python.org/python/branches/py3k

........
  r87373 | senthil.kumaran | 2010-12-18 17:55:23 +0100 (sam., 18 déc. 2010) | 3 lines

  Fix Issue6791 - Limit the HTTP header readline with _MAXLENGTH. Patch by Antoine Pitrou
........
  r87381 | antoine.pitrou | 2010-12-18 18:59:18 +0100 (sam., 18 déc. 2010) | 3 lines

  NEWS entry for r87373
........
parent df9c40ae
...@@ -203,6 +203,9 @@ responses = { ...@@ -203,6 +203,9 @@ responses = {
# maximal amount of data to read at one time in _safe_read # maximal amount of data to read at one time in _safe_read
MAXAMOUNT = 1048576 MAXAMOUNT = 1048576
# maximal line length when calling readline().
_MAXLINE = 65536
class HTTPMessage(email.message.Message): class HTTPMessage(email.message.Message):
# XXX The only usage of this method is in # XXX The only usage of this method is in
# http.server.CGIHTTPRequestHandler. Maybe move the code there so # http.server.CGIHTTPRequestHandler. Maybe move the code there so
...@@ -245,7 +248,9 @@ def parse_headers(fp, _class=HTTPMessage): ...@@ -245,7 +248,9 @@ def parse_headers(fp, _class=HTTPMessage):
""" """
headers = [] headers = []
while True: while True:
line = fp.readline() line = fp.readline(_MAXLINE + 1)
if len(line) > _MAXLINE:
raise LineTooLong("header line")
headers.append(line) headers.append(line)
if line in (b'\r\n', b'\n', b''): if line in (b'\r\n', b'\n', b''):
break break
...@@ -349,7 +354,10 @@ class HTTPResponse(io.RawIOBase): ...@@ -349,7 +354,10 @@ class HTTPResponse(io.RawIOBase):
break break
# skip the header from the 100 response # skip the header from the 100 response
while True: while True:
skip = self.fp.readline().strip() skip = self.fp.readline(_MAXLINE + 1)
if len(skip) > _MAXLINE:
raise LineTooLong("header line")
skip = skip.strip()
if not skip: if not skip:
break break
if self.debuglevel > 0: if self.debuglevel > 0:
...@@ -525,7 +533,9 @@ class HTTPResponse(io.RawIOBase): ...@@ -525,7 +533,9 @@ class HTTPResponse(io.RawIOBase):
value = [] value = []
while True: while True:
if chunk_left is None: if chunk_left is None:
line = self.fp.readline() line = self.fp.readline(_MAXLINE + 1)
if len(line) > _MAXLINE:
raise LineTooLong("chunk size")
i = line.find(b";") i = line.find(b";")
if i >= 0: if i >= 0:
line = line[:i] # strip chunk-extensions line = line[:i] # strip chunk-extensions
...@@ -560,7 +570,9 @@ class HTTPResponse(io.RawIOBase): ...@@ -560,7 +570,9 @@ class HTTPResponse(io.RawIOBase):
# read and discard trailer up to the CRLF terminator # read and discard trailer up to the CRLF terminator
### note: we shouldn't have any trailers! ### note: we shouldn't have any trailers!
while True: while True:
line = self.fp.readline() line = self.fp.readline(_MAXLINE + 1)
if len(line) > _MAXLINE:
raise LineTooLong("trailer line")
if not line: if not line:
# a vanishingly small number of sites EOF without # a vanishingly small number of sites EOF without
# sending the trailer # sending the trailer
...@@ -703,7 +715,9 @@ class HTTPConnection: ...@@ -703,7 +715,9 @@ class HTTPConnection:
raise socket.error("Tunnel connection failed: %d %s" % (code, raise socket.error("Tunnel connection failed: %d %s" % (code,
message.strip())) message.strip()))
while True: while True:
line = response.fp.readline() line = response.fp.readline(_MAXLINE + 1)
if len(line) > _MAXLINE:
raise LineTooLong("header line")
if line == b'\r\n': if line == b'\r\n':
break break
...@@ -1133,6 +1147,11 @@ class BadStatusLine(HTTPException): ...@@ -1133,6 +1147,11 @@ class BadStatusLine(HTTPException):
self.args = line, self.args = line,
self.line = line self.line = line
class LineTooLong(HTTPException):
def __init__(self, line_type):
HTTPException.__init__(self, "got more than %d bytes when reading %s"
% (_MAXLINE, line_type))
# for backwards compatibility # for backwards compatibility
error = HTTPException error = HTTPException
......
...@@ -314,8 +314,12 @@ class BaseHTTPRequestHandler(socketserver.StreamRequestHandler): ...@@ -314,8 +314,12 @@ class BaseHTTPRequestHandler(socketserver.StreamRequestHandler):
self.command, self.path, self.request_version = command, path, version self.command, self.path, self.request_version = command, path, version
# Examine the headers and look for a Connection directive. # Examine the headers and look for a Connection directive.
try:
self.headers = http.client.parse_headers(self.rfile, self.headers = http.client.parse_headers(self.rfile,
_class=self.MessageClass) _class=self.MessageClass)
except http.client.LineTooLong:
self.send_error(400, "Line too long")
return False
conntype = self.headers.get('Connection', "") conntype = self.headers.get('Connection', "")
if conntype.lower() == 'close': if conntype.lower() == 'close':
......
...@@ -303,6 +303,34 @@ class BasicTest(TestCase): ...@@ -303,6 +303,34 @@ class BasicTest(TestCase):
self.assertEqual("Basic realm=\"example\"", self.assertEqual("Basic realm=\"example\"",
resp.getheader("www-authenticate")) resp.getheader("www-authenticate"))
# Test lines overflowing the max line size (_MAXLINE in http.client)
def test_overflowing_status_line(self):
self.skipTest("disabled for HTTP 0.9 support")
body = "HTTP/1.1 200 Ok" + "k" * 65536 + "\r\n"
resp = client.HTTPResponse(FakeSocket(body))
self.assertRaises((client.LineTooLong, client.BadStatusLine), resp.begin)
def test_overflowing_header_line(self):
body = (
'HTTP/1.1 200 OK\r\n'
'X-Foo: bar' + 'r' * 65536 + '\r\n\r\n'
)
resp = client.HTTPResponse(FakeSocket(body))
self.assertRaises(client.LineTooLong, resp.begin)
def test_overflowing_chunked_line(self):
body = (
'HTTP/1.1 200 OK\r\n'
'Transfer-Encoding: chunked\r\n\r\n'
+ '0' * 65536 + 'a\r\n'
'hello world\r\n'
'0\r\n'
)
resp = client.HTTPResponse(FakeSocket(body))
resp.begin()
self.assertRaises(client.LineTooLong, resp.read)
class OfflineTest(TestCase): class OfflineTest(TestCase):
def test_responses(self): def test_responses(self):
self.assertEqual(client.responses[client.NOT_FOUND], "Not Found") self.assertEqual(client.responses[client.NOT_FOUND], "Not Found")
......
...@@ -144,6 +144,13 @@ class BaseHTTPRequestHandlerTestCase(unittest.TestCase): ...@@ -144,6 +144,13 @@ class BaseHTTPRequestHandlerTestCase(unittest.TestCase):
self.assertEqual(result[0], b'HTTP/1.1 414 Request-URI Too Long\r\n') self.assertEqual(result[0], b'HTTP/1.1 414 Request-URI Too Long\r\n')
self.assertFalse(self.handler.get_called) self.assertFalse(self.handler.get_called)
def test_header_length(self):
# Issue #6791: same for headers
result = self.send_typical_request(
b'GET / HTTP/1.1\r\nX-Foo: bar' + b'r' * 65537 + b'\r\n\r\n')
self.assertEqual(result[0], b'HTTP/1.1 400 Line too long\r\n')
self.assertFalse(self.handler.get_called)
class BaseHTTPServerTestCase(BaseTestCase): class BaseHTTPServerTestCase(BaseTestCase):
class request_handler(NoLogRequestHandler, BaseHTTPRequestHandler): class request_handler(NoLogRequestHandler, BaseHTTPRequestHandler):
......
...@@ -24,6 +24,9 @@ Core and Builtins ...@@ -24,6 +24,9 @@ Core and Builtins
Library Library
------- -------
- Issue #6791: Limit header line length (to 65535 bytes) in http.client
and http.server, to avoid denial of services from the other party.
- Issue #10404: Use ctl-button-1 on OSX for the context menu in Idle. - Issue #10404: Use ctl-button-1 on OSX for the context menu in Idle.
- Issue #4188: Avoid creating dummy thread objects when logging operations - Issue #4188: Avoid creating dummy thread objects when logging operations
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment