diff options
author | Guido van Rossum <guido@python.org> | 2014-09-16 22:45:36 (GMT) |
---|---|---|
committer | Guido van Rossum <guido@python.org> | 2014-09-16 22:45:36 (GMT) |
commit | c9cdd0ccadfaaac177ab7a866b979db3b073f660 (patch) | |
tree | 00d7284e501ec1c19e471bb15348e6d0ff035ae9 | |
parent | 038fac67c02d85df2d34f1092a51db31f758bb63 (diff) | |
download | cpython-c9cdd0ccadfaaac177ab7a866b979db3b073f660.zip cpython-c9cdd0ccadfaaac177ab7a866b979db3b073f660.tar.gz cpython-c9cdd0ccadfaaac177ab7a866b979db3b073f660.tar.bz2 |
Lax cookie parsing in http.cookies could be a security issue when
combined with non-standard cookie handling in some Web browsers.
Reported by Sergey Bobrov.
-rw-r--r-- | Lib/Cookie.py | 3 | ||||
-rw-r--r-- | Lib/test/test_cookie.py | 9 | ||||
-rw-r--r-- | Misc/ACKS | 1 | ||||
-rw-r--r-- | Misc/NEWS | 3 |
4 files changed, 15 insertions, 1 deletions
diff --git a/Lib/Cookie.py b/Lib/Cookie.py index a5239ca..d674437 100644 --- a/Lib/Cookie.py +++ b/Lib/Cookie.py @@ -531,6 +531,7 @@ class Morsel(dict): _LegalCharsPatt = r"[\w\d!#%&'~_`><@,:/\$\*\+\-\.\^\|\)\(\?\}\{\=]" _CookiePattern = re.compile( r"(?x)" # This is a Verbose pattern + r"\s*" # Optional whitespace at start of cookie r"(?P<key>" # Start of group 'key' ""+ _LegalCharsPatt +"+?" # Any word of at least one letter, nongreedy r")" # End of group 'key' @@ -646,7 +647,7 @@ class BaseCookie(dict): while 0 <= i < n: # Start looking for a cookie - match = patt.search(str, i) + match = patt.match(str, i) if not match: break # No more cookies K,V = match.group("key"), match.group("val") diff --git a/Lib/test/test_cookie.py b/Lib/test/test_cookie.py index 5370a8d..41ba60f 100644 --- a/Lib/test/test_cookie.py +++ b/Lib/test/test_cookie.py @@ -133,6 +133,15 @@ class CookieTests(unittest.TestCase): self.assertEqual(C['Customer']['version'], '1') self.assertEqual(C['Customer']['path'], '/acme') + def test_invalid_cookies(self): + # Accepting these could be a security issue + C = Cookie.SimpleCookie() + for s in (']foo=x', '[foo=x', 'blah]foo=x', 'blah[foo=x'): + C.load(s) + self.assertEqual(dict(C), {}) + self.assertEqual(C.output(), '') + + def test_main(): run_unittest(CookieTests) if Cookie.__doc__ is not None: @@ -136,6 +136,7 @@ Martin Bless Pablo Bleyer Erik van Blokland Eric Blossom +Sergey Bobrov Finn Bock Paul Boddie Matthew Boedicker @@ -21,6 +21,9 @@ Core and Builtins Library ------- +- Lax cookie parsing in http.cookies could be a security issue when combined + with non-standard cookie handling in some Web browsers. Reported by + Sergey Bobrov. - Issue #21147: sqlite3 now raises an exception if the request contains a null character instead of truncate it. Based on patch by Victor Stinner. |