forked from python/cpython
-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Cherry picked 2f630e1, with some minor fixups by hand
- Loading branch information
Frederick Price
committed
Aug 8, 2023
1 parent
ecd9946
commit 2d53a49
Showing
4 changed files
with
99 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -719,6 +719,65 @@ def test_urlsplit_strip_url(self): | |
self.assertEqual(p.scheme, "https") | ||
self.assertEqual(p.geturl(), "https://www.python.org/") | ||
|
||
def test_urlsplit_strip_url(self): | ||
noise = bytes(range(0, 0x20 + 1)) | ||
base_url = "http://User:[email protected]:080/doc/?query=yes#frag" | ||
|
||
url = noise.decode("utf-8") + base_url | ||
p = urllib.parse.urlsplit(url) | ||
self.assertEqual(p.scheme, "http") | ||
self.assertEqual(p.netloc, "User:[email protected]:080") | ||
self.assertEqual(p.path, "/doc/") | ||
self.assertEqual(p.query, "query=yes") | ||
self.assertEqual(p.fragment, "frag") | ||
self.assertEqual(p.username, "User") | ||
self.assertEqual(p.password, "Pass") | ||
self.assertEqual(p.hostname, "www.python.org") | ||
self.assertEqual(p.port, 80) | ||
self.assertEqual(p.geturl(), base_url) | ||
|
||
url = noise + base_url.encode("utf-8") | ||
p = urllib.parse.urlsplit(url) | ||
self.assertEqual(p.scheme, b"http") | ||
self.assertEqual(p.netloc, b"User:[email protected]:080") | ||
self.assertEqual(p.path, b"/doc/") | ||
self.assertEqual(p.query, b"query=yes") | ||
self.assertEqual(p.fragment, b"frag") | ||
self.assertEqual(p.username, b"User") | ||
self.assertEqual(p.password, b"Pass") | ||
self.assertEqual(p.hostname, b"www.python.org") | ||
self.assertEqual(p.port, 80) | ||
self.assertEqual(p.geturl(), base_url.encode("utf-8")) | ||
|
||
# Test that trailing space is preserved as some applications rely on | ||
# this within query strings. | ||
query_spaces_url = "https://www.python.org:88/doc/?query= " | ||
p = urllib.parse.urlsplit(noise.decode("utf-8") + query_spaces_url) | ||
self.assertEqual(p.scheme, "https") | ||
self.assertEqual(p.netloc, "www.python.org:88") | ||
self.assertEqual(p.path, "/doc/") | ||
self.assertEqual(p.query, "query= ") | ||
self.assertEqual(p.port, 88) | ||
self.assertEqual(p.geturl(), query_spaces_url) | ||
|
||
p = urllib.parse.urlsplit("www.pypi.org ") | ||
# That "hostname" gets considered a "path" due to the | ||
# trailing space and our existing logic... YUCK... | ||
# and re-assembles via geturl aka unurlsplit into the original. | ||
# django.core.validators.URLValidator (at least through v3.2) relies on | ||
# this, for better or worse, to catch it in a ValidationError via its | ||
# regular expressions. | ||
# Here we test the basic round trip concept of such a trailing space. | ||
self.assertEqual(urllib.parse.urlunsplit(p), "www.pypi.org ") | ||
|
||
# with scheme as cache-key | ||
url = "//www.python.org/" | ||
scheme = noise.decode("utf-8") + "https" + noise.decode("utf-8") | ||
for _ in range(2): | ||
p = urllib.parse.urlsplit(url, scheme=scheme) | ||
self.assertEqual(p.scheme, "https") | ||
self.assertEqual(p.geturl(), "https://www.python.org/") | ||
|
||
def test_attributes_bad_port(self): | ||
"""Check handling of invalid ports.""" | ||
for bytes in (False, True): | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
3 changes: 3 additions & 0 deletions
3
Misc/NEWS.d/next/Security/2023-03-07-20-59-17.gh-issue-102153.14CLSZ.rst
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
:func:`urllib.parse.urlsplit` now strips leading C0 control and space | ||
characters following the specification for URLs defined by WHATWG in | ||
response to CVE-2023-24329. Patch by Illia Volochii. |