Commit b1e36073 authored by Antoine Pitrou's avatar Antoine Pitrou

Issue #22796: HTTP cookie parsing is now stricter, in order to protect against...

Issue #22796: HTTP cookie parsing is now stricter, in order to protect against potential injection attacks.
parent 35830270
...@@ -533,10 +533,17 @@ class BaseCookie(dict): ...@@ -533,10 +533,17 @@ class BaseCookie(dict):
return return
def __parse_string(self, str, patt=_CookiePattern): def __parse_string(self, str, patt=_CookiePattern):
i = 0 # Our starting point i = 0 # Our starting point
n = len(str) # Length of string n = len(str) # Length of string
M = None # current morsel parsed_items = [] # Parsed (type, key, value) triples
morsel_seen = False # A key=value pair was previously encountered
TYPE_ATTRIBUTE = 1
TYPE_KEYVALUE = 2
# We first parse the whole cookie string and reject it if it's
# syntactically invalid (this helps avoid some classes of injection
# attacks).
while 0 <= i < n: while 0 <= i < n:
# Start looking for a cookie # Start looking for a cookie
match = patt.match(str, i) match = patt.match(str, i)
...@@ -547,22 +554,41 @@ class BaseCookie(dict): ...@@ -547,22 +554,41 @@ class BaseCookie(dict):
key, value = match.group("key"), match.group("val") key, value = match.group("key"), match.group("val")
i = match.end(0) i = match.end(0)
# Parse the key, value in case it's metainfo
if key[0] == "$": if key[0] == "$":
# We ignore attributes which pertain to the cookie if not morsel_seen:
# mechanism as a whole. See RFC 2109. # We ignore attributes which pertain to the cookie
# (Does anyone care?) # mechanism as a whole, such as "$Version".
if M: # See RFC 2965. (Does anyone care?)
M[key[1:]] = value continue
parsed_items.append((TYPE_ATTRIBUTE, key[1:], value))
elif key.lower() in Morsel._reserved: elif key.lower() in Morsel._reserved:
if M: if not morsel_seen:
if value is None: # Invalid cookie string
if key.lower() in Morsel._flags: return
M[key] = True if value is None:
if key.lower() in Morsel._flags:
parsed_items.append((TYPE_ATTRIBUTE, key, True))
else: else:
M[key] = _unquote(value) # Invalid cookie string
return
else:
parsed_items.append((TYPE_ATTRIBUTE, key, _unquote(value)))
elif value is not None: elif value is not None:
rval, cval = self.value_decode(value) parsed_items.append((TYPE_KEYVALUE, key, self.value_decode(value)))
morsel_seen = True
else:
# Invalid cookie string
return
# The cookie string is valid, apply it.
M = None # current morsel
for tp, key, value in parsed_items:
if tp == TYPE_ATTRIBUTE:
assert M is not None
M[key] = value
else:
assert tp == TYPE_KEYVALUE
rval, cval = value
self.__set(key, rval, cval) self.__set(key, rval, cval)
M = self[key] M = self[key]
......
...@@ -141,13 +141,6 @@ class CookieTests(unittest.TestCase): ...@@ -141,13 +141,6 @@ class CookieTests(unittest.TestCase):
self.assertEqual(C['eggs']['httponly'], 'foo') self.assertEqual(C['eggs']['httponly'], 'foo')
self.assertEqual(C['eggs']['secure'], 'bar') self.assertEqual(C['eggs']['secure'], 'bar')
def test_bad_attrs(self):
# issue 16611: make sure we don't break backward compatibility.
C = cookies.SimpleCookie()
C.load('cookie=with; invalid; version; second=cookie;')
self.assertEqual(C.output(),
'Set-Cookie: cookie=with\r\nSet-Cookie: second=cookie')
def test_extra_spaces(self): def test_extra_spaces(self):
C = cookies.SimpleCookie() C = cookies.SimpleCookie()
C.load('eggs = scrambled ; secure ; path = bar ; foo=foo ') C.load('eggs = scrambled ; secure ; path = bar ; foo=foo ')
...@@ -182,7 +175,10 @@ class CookieTests(unittest.TestCase): ...@@ -182,7 +175,10 @@ class CookieTests(unittest.TestCase):
def test_invalid_cookies(self): def test_invalid_cookies(self):
# Accepting these could be a security issue # Accepting these could be a security issue
C = cookies.SimpleCookie() C = cookies.SimpleCookie()
for s in (']foo=x', '[foo=x', 'blah]foo=x', 'blah[foo=x'): for s in (']foo=x', '[foo=x', 'blah]foo=x', 'blah[foo=x',
'Set-Cookie: foo=bar', 'Set-Cookie: foo',
'foo=bar; baz', 'baz; foo=bar',
'secure;foo=bar', 'Version=1;foo=bar'):
C.load(s) C.load(s)
self.assertEqual(dict(C), {}) self.assertEqual(dict(C), {})
self.assertEqual(C.output(), '') self.assertEqual(C.output(), '')
......
...@@ -188,6 +188,9 @@ Core and Builtins ...@@ -188,6 +188,9 @@ Core and Builtins
Library Library
------- -------
- Issue #22796: HTTP cookie parsing is now stricter, in order to protect
against potential injection attacks.
- Issue #22370: Windows detection in pathlib is now more robust. - Issue #22370: Windows detection in pathlib is now more robust.
- Issue #22841: Reject coroutines in asyncio add_signal_handler(). - Issue #22841: Reject coroutines in asyncio add_signal_handler().
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment