!14 fix CVE-2021-33503
From: @zzm_567 Reviewed-by: @zengwefeng Signed-off-by: @zengwefeng
This commit is contained in:
commit
7725e36b4e
64
backport-CVE-2021-33503.patch
Normal file
64
backport-CVE-2021-33503.patch
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
From 2d4a3fee6de2fa45eb82169361918f759269b4ec Mon Sep 17 00:00:00 2001
|
||||||
|
From: Seth Michael Larson <sethmichaellarson@gmail.com>
|
||||||
|
Date: Wed, 26 May 2021 10:43:12 -0500
|
||||||
|
Subject: [PATCH] Improve performance of sub-authority splitting in URL
|
||||||
|
|
||||||
|
---
|
||||||
|
src/urllib3/util/url.py | 8 +++++---
|
||||||
|
test/test_util.py | 10 ++++++++++
|
||||||
|
2 files changed, 15 insertions(+), 3 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/src/urllib3/util/url.py b/src/urllib3/util/url.py
|
||||||
|
index 793324e..318a6d6 100644
|
||||||
|
--- a/src/urllib3/util/url.py
|
||||||
|
+++ b/src/urllib3/util/url.py
|
||||||
|
@@ -63,12 +63,12 @@ IPV6_ADDRZ_RE = re.compile("^" + IPV6_ADDRZ_PAT + "$")
|
||||||
|
BRACELESS_IPV6_ADDRZ_RE = re.compile("^" + IPV6_ADDRZ_PAT[2:-2] + "$")
|
||||||
|
ZONE_ID_RE = re.compile("(" + ZONE_ID_PAT + r")\]$")
|
||||||
|
|
||||||
|
-SUBAUTHORITY_PAT = (u"^(?:(.*)@)?(%s|%s|%s)(?::([0-9]{0,5}))?$") % (
|
||||||
|
+_HOST_PORT_PAT = ("^(%s|%s|%s)(?::([0-9]{0,5}))?$") % (
|
||||||
|
REG_NAME_PAT,
|
||||||
|
IPV4_PAT,
|
||||||
|
IPV6_ADDRZ_PAT,
|
||||||
|
)
|
||||||
|
-SUBAUTHORITY_RE = re.compile(SUBAUTHORITY_PAT, re.UNICODE | re.DOTALL)
|
||||||
|
+_HOST_PORT_RE = re.compile(_HOST_PORT_PAT, re.UNICODE | re.DOTALL)
|
||||||
|
|
||||||
|
UNRESERVED_CHARS = set(
|
||||||
|
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789._-~"
|
||||||
|
@@ -365,7 +365,9 @@ def parse_url(url):
|
||||||
|
scheme = scheme.lower()
|
||||||
|
|
||||||
|
if authority:
|
||||||
|
- auth, host, port = SUBAUTHORITY_RE.match(authority).groups()
|
||||||
|
+ auth, _, host_port = authority.rpartition("@")
|
||||||
|
+ auth = auth or None
|
||||||
|
+ host, port = _HOST_PORT_RE.match(host_port).groups()
|
||||||
|
if auth and normalize_uri:
|
||||||
|
auth = _encode_invalid_chars(auth, USERINFO_CHARS)
|
||||||
|
if port == "":
|
||||||
|
diff --git a/test/test_util.py b/test/test_util.py
|
||||||
|
index 838c751..ef6aa11 100644
|
||||||
|
--- a/test/test_util.py
|
||||||
|
+++ b/test/test_util.py
|
||||||
|
@@ -437,6 +437,16 @@ class TestUtil(object):
|
||||||
|
fragment="hash",
|
||||||
|
),
|
||||||
|
),
|
||||||
|
+ # Tons of '@' causing backtracking
|
||||||
|
+ ("https://" + ("@" * 10000) + "[", False),
|
||||||
|
+ (
|
||||||
|
+ "https://user:" + ("@" * 10000) + "example.com",
|
||||||
|
+ Url(
|
||||||
|
+ scheme="https",
|
||||||
|
+ auth="user:" + ("%40" * 9999),
|
||||||
|
+ host="example.com",
|
||||||
|
+ ),
|
||||||
|
+ ),
|
||||||
|
]
|
||||||
|
|
||||||
|
@pytest.mark.parametrize("url, expected_url", url_vulnerabilities)
|
||||||
|
--
|
||||||
|
2.23.0
|
||||||
|
|
||||||
@ -3,7 +3,7 @@
|
|||||||
|
|
||||||
Name: python-%{srcname}
|
Name: python-%{srcname}
|
||||||
Version: 1.26.3
|
Version: 1.26.3
|
||||||
Release: 2
|
Release: 3
|
||||||
Summary: Sanity-friendly HTTP client for Python
|
Summary: Sanity-friendly HTTP client for Python
|
||||||
License: MIT
|
License: MIT
|
||||||
URL: https://urllib3.readthedocs.io
|
URL: https://urllib3.readthedocs.io
|
||||||
@ -12,6 +12,7 @@ Source1: ssl_match_hostname_py3.py
|
|||||||
|
|
||||||
Patch0001: remove_mock.patch
|
Patch0001: remove_mock.patch
|
||||||
Patch6000: backport-CVE-2021-28363.patch
|
Patch6000: backport-CVE-2021-28363.patch
|
||||||
|
Patch6001: backport-CVE-2021-33503.patch
|
||||||
|
|
||||||
BuildArch: noarch
|
BuildArch: noarch
|
||||||
|
|
||||||
@ -73,6 +74,9 @@ PYTHONPATH=%{buildroot}%{python3_sitelib}:%{python3_sitelib} %{__python3} -m pyt
|
|||||||
%{python3_sitelib}/urllib3-*.egg-info
|
%{python3_sitelib}/urllib3-*.egg-info
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon Jul 5 2021 zhanzhimin <zhanzhimin@huawei.com> - 1.26.3-3
|
||||||
|
- fix CVE-2021-33503
|
||||||
|
|
||||||
* Tue Jun 1 2021 hanhui <hanhui15@huawei.com> - 1.26.3-2
|
* Tue Jun 1 2021 hanhui <hanhui15@huawei.com> - 1.26.3-2
|
||||||
- fix CVE-2021-28363
|
- fix CVE-2021-28363
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user