summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGeorg Brandl <georg@python.org>2013-11-11 05:10:23 (GMT)
committerGeorg Brandl <georg@python.org>2013-11-11 05:10:23 (GMT)
commitb3acaccf273feb720df10c2890d6c35ca8b62acd (patch)
tree857388a2ce1d64761d9359bfff4e78422c481fa7
parent85b8be1ac88de7b2bbe06c47e45b9c0087e8037d (diff)
downloadcpython-b3acaccf273feb720df10c2890d6c35ca8b62acd.zip
cpython-b3acaccf273feb720df10c2890d6c35ca8b62acd.tar.gz
cpython-b3acaccf273feb720df10c2890d6c35ca8b62acd.tar.bz2
Transplant of rev 544b654d000c: directory traversal attack in CGIHttpRequestHandler.
-rw-r--r--Lib/http/server.py9
-rw-r--r--Lib/test/test_httpservers.py12
-rw-r--r--Misc/NEWS5
3 files changed, 21 insertions, 5 deletions
diff --git a/Lib/http/server.py b/Lib/http/server.py
index ebc2a8f..2bfda12 100644
--- a/Lib/http/server.py
+++ b/Lib/http/server.py
@@ -987,18 +987,17 @@ class CGIHTTPRequestHandler(SimpleHTTPRequestHandler):
def run_cgi(self):
"""Execute a CGI script."""
- path = self.path
dir, rest = self.cgi_info
- i = path.find('/', len(dir) + 1)
+ i = rest.find('/')
while i >= 0:
- nextdir = path[:i]
- nextrest = path[i+1:]
+ nextdir = rest[:i]
+ nextrest = rest[i+1:]
scriptdir = self.translate_path(nextdir)
if os.path.isdir(scriptdir):
dir, rest = nextdir, nextrest
- i = path.find('/', len(dir) + 1)
+ i = rest.find('/')
else:
break
diff --git a/Lib/test/test_httpservers.py b/Lib/test/test_httpservers.py
index b8bbcb6..9dd2778 100644
--- a/Lib/test/test_httpservers.py
+++ b/Lib/test/test_httpservers.py
@@ -325,6 +325,7 @@ class CGIHTTPServerTestCase(BaseTestCase):
self.parent_dir = tempfile.mkdtemp()
self.cgi_dir = os.path.join(self.parent_dir, 'cgi-bin')
os.mkdir(self.cgi_dir)
+ self.nocgi_path = None
self.file1_path = None
self.file2_path = None
@@ -345,6 +346,11 @@ class CGIHTTPServerTestCase(BaseTestCase):
self.tearDown()
self.skipTest("Python executable path is not encodable to utf-8")
+ self.nocgi_path = os.path.join(self.parent_dir, 'nocgi.py')
+ with open(self.nocgi_path, 'w') as fp:
+ fp.write(cgi_file1 % self.pythonexe)
+ os.chmod(self.nocgi_path, 0o777)
+
self.file1_path = os.path.join(self.cgi_dir, 'file1.py')
with open(self.file1_path, 'w', encoding='utf-8') as file1:
file1.write(cgi_file1 % self.pythonexe)
@@ -362,6 +368,8 @@ class CGIHTTPServerTestCase(BaseTestCase):
os.chdir(self.cwd)
if self.pythonexe != sys.executable:
os.remove(self.pythonexe)
+ if self.nocgi_path:
+ os.remove(self.nocgi_path)
if self.file1_path:
os.remove(self.file1_path)
if self.file2_path:
@@ -418,6 +426,10 @@ class CGIHTTPServerTestCase(BaseTestCase):
self.assertEqual((b'Hello World' + self.linesep, 'text/html', 200),
(res.read(), res.getheader('Content-type'), res.status))
+ def test_issue19435(self):
+ res = self.request('///////////nocgi.py/../cgi-bin/nothere.sh')
+ self.assertEqual(res.status, 404)
+
def test_post(self):
params = urllib.parse.urlencode(
{'spam' : 1, 'eggs' : 'python', 'bacon' : 123456})
diff --git a/Misc/NEWS b/Misc/NEWS
index 9ff03c2..dfb6068 100644
--- a/Misc/NEWS
+++ b/Misc/NEWS
@@ -7,6 +7,11 @@ What's New in Python 3.3.3?
*Release date: XX-Nov-2013*
+Library
+-------
+
+- Issue #19435: Fix directory traversal attack on CGIHttpRequestHandler.
+
Tests
-----