* Fix #1908

* Code format
This commit is contained in:
yhirose 2024-09-03 00:47:39 -04:00 committed by GitHub
parent c5ee208775
commit b1f8e986bf
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 61 additions and 2 deletions

View File

@ -2790,6 +2790,10 @@ inline bool stream_line_reader::getline() {
fixed_buffer_used_size_ = 0; fixed_buffer_used_size_ = 0;
glowable_buffer_.clear(); glowable_buffer_.clear();
#ifndef CPPHTTPLIB_ALLOW_LF_AS_LINE_TERMINATOR
char prev_byte = 0;
#endif
for (size_t i = 0;; i++) { for (size_t i = 0;; i++) {
char byte; char byte;
auto n = strm_.read(&byte, 1); auto n = strm_.read(&byte, 1);
@ -2806,7 +2810,12 @@ inline bool stream_line_reader::getline() {
append(byte); append(byte);
#ifdef CPPHTTPLIB_ALLOW_LF_AS_LINE_TERMINATOR
if (byte == '\n') { break; } if (byte == '\n') { break; }
#else
if (prev_byte == '\r' && byte == '\n') { break; }
prev_byte = byte;
#endif
} }
return true; return true;
@ -2862,7 +2871,8 @@ inline bool mmap::open(const char *path) {
// If the following line doesn't compile due to QuadPart, update Windows SDK. // If the following line doesn't compile due to QuadPart, update Windows SDK.
// See: // See:
// https://github.com/yhirose/cpp-httplib/issues/1903#issuecomment-2316520721 // https://github.com/yhirose/cpp-httplib/issues/1903#issuecomment-2316520721
if (static_cast<ULONGLONG>(size.QuadPart) > std::numeric_limits<decltype(size_)>::max()) { if (static_cast<ULONGLONG>(size.QuadPart) >
std::numeric_limits<decltype(size_)>::max()) {
// `size_t` might be 32-bits, on 32-bits Windows. // `size_t` might be 32-bits, on 32-bits Windows.
return false; return false;
} }
@ -4049,7 +4059,22 @@ inline bool read_headers(Stream &strm, Headers &headers) {
auto end = line_reader.ptr() + line_reader.size() - line_terminator_len; auto end = line_reader.ptr() + line_reader.size() - line_terminator_len;
parse_header(line_reader.ptr(), end, parse_header(line_reader.ptr(), end,
[&](const std::string &key, const std::string &val) { [&](const std::string &key, std::string &val) {
// NOTE: From RFC 9110:
// Field values containing CR, LF, or NUL characters are
// invalid and dangerous, due to the varying ways that
// implementations might parse and interpret those
// characters; a recipient of CR, LF, or NUL within a field
// value MUST either reject the message or replace each of
// those characters with SP before further processing or
// forwarding of that message.
for (auto &c : val) {
switch (c) {
case '\0':
case '\n':
case '\r': c = ' '; break;
}
}
headers.emplace(key, val); headers.emplace(key, val);
}); });
} }

View File

@ -4718,6 +4718,11 @@ static void test_raw_request(const std::string &req,
svr.Put("/put_hi", [&](const Request & /*req*/, Response &res) { svr.Put("/put_hi", [&](const Request & /*req*/, Response &res) {
res.set_content("ok", "text/plain"); res.set_content("ok", "text/plain");
}); });
svr.Get("/header_field_value_check", [&](const Request &req, Response &res) {
auto val = req.get_header_value("Test");
EXPECT_EQ("[ ]", val);
res.set_content("ok", "text/plain");
});
// Server read timeout must be longer than the client read timeout for the // Server read timeout must be longer than the client read timeout for the
// bug to reproduce, probably to force the server to process a request // bug to reproduce, probably to force the server to process a request
@ -4851,6 +4856,12 @@ TEST(ServerRequestParsingTest, InvalidSpaceInURL) {
EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24)); EXPECT_EQ("HTTP/1.1 400 Bad Request", out.substr(0, 24));
} }
TEST(ServerRequestParsingTest, InvalidFieldValueContains_CR_LF_NUL) {
std::string request(
"GET /header_field_value_check HTTP/1.1\r\nTest: [\r\x00\n]\r\n\r\n", 55);
test_raw_request(request);
}
TEST(ServerStopTest, StopServerWithChunkedTransmission) { TEST(ServerStopTest, StopServerWithChunkedTransmission) {
Server svr; Server svr;
@ -7572,3 +7583,26 @@ TEST(FileSystemTest, FileAndDirExistenceCheck) {
EXPECT_FALSE(detail::is_file(dir_path)); EXPECT_FALSE(detail::is_file(dir_path));
EXPECT_TRUE(detail::is_dir(dir_path)); EXPECT_TRUE(detail::is_dir(dir_path));
} }
TEST(DirtyDataRequestTest, HeadFieldValueContains_CR_LF_NUL) {
Server svr;
svr.Get("/test", [&](const Request &req, Response &) {
auto val = req.get_header_value("Test");
EXPECT_EQ(val.size(), 7u);
EXPECT_EQ(val, "_ _ _");
});
auto thread = std::thread([&]() { svr.listen(HOST, PORT); });
auto se = detail::scope_exit([&] {
svr.stop();
thread.join();
ASSERT_FALSE(svr.is_running());
});
svr.wait_until_ready();
Client cli(HOST, PORT);
cli.Get("/test", {{"Test", "_\n\r_\n\r_"}});
}