fix CVE-2023-43804
(cherry picked from commit 1a92309e4c3a619755f62b03b22689250db10f87)
This commit is contained in:
parent
d46afef458
commit
3abc2527fc
139
CVE-2023-43804.patch
Normal file
139
CVE-2023-43804.patch
Normal file
@ -0,0 +1,139 @@
|
|||||||
|
From 01220354d389cd05474713f8c982d05c9b17aafb Mon Sep 17 00:00:00 2001
|
||||||
|
From: Seth Michael Larson <sethmichaellarson@gmail.com>
|
||||||
|
Date: Mon, 2 Oct 2023 11:43:46 -0500
|
||||||
|
Subject: [PATCH] Backport GHSA-v845-jxx5-vc9f (#3139)
|
||||||
|
|
||||||
|
Co-authored-by: Quentin Pradet <quentin.pradet@gmail.com>
|
||||||
|
Co-authored-by: Illia Volochii <illia.volochii@gmail.com>
|
||||||
|
---
|
||||||
|
src/urllib3/util/retry.py | 2 +-
|
||||||
|
test/test_retry.py | 4 ++--
|
||||||
|
test/with_dummyserver/test_poolmanager.py | 24 ++++++++++++++++++-----
|
||||||
|
3 files changed, 28 insertions(+), 9 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/src/urllib3/util/retry.py b/src/urllib3/util/retry.py
|
||||||
|
index 2490d5e5b6..60ef6c4f3f 100644
|
||||||
|
--- a/src/urllib3/util/retry.py
|
||||||
|
+++ b/src/urllib3/util/retry.py
|
||||||
|
@@ -154,7 +154,7 @@
|
||||||
|
|
||||||
|
RETRY_AFTER_STATUS_CODES = frozenset([413, 429, 503])
|
||||||
|
|
||||||
|
- DEFAULT_REDIRECT_HEADERS_BLACKLIST = frozenset(["Authorization"])
|
||||||
|
+ DEFAULT_REDIRECT_HEADERS_BLACKLIST = frozenset(["Cookie", "Authorization"])
|
||||||
|
|
||||||
|
#: Maximum backoff time.
|
||||||
|
BACKOFF_MAX = 120
|
||||||
|
diff --git a/test/test_retry.py b/test/test_retry.py
|
||||||
|
index 21ba1e92e1..95a33e7461 100644
|
||||||
|
--- a/test/test_retry.py
|
||||||
|
+++ b/test/test_retry.py
|
||||||
|
@@ -293,12 +293,12 @@ def test_retry_method_not_in_whitelist(self):
|
||||||
|
def test_retry_default_remove_headers_on_redirect(self):
|
||||||
|
retry = Retry()
|
||||||
|
|
||||||
|
- assert list(retry.remove_headers_on_redirect) == ["authorization"]
|
||||||
|
+ assert retry.remove_headers_on_redirect == {"authorization", "cookie"}
|
||||||
|
|
||||||
|
def test_retry_set_remove_headers_on_redirect(self):
|
||||||
|
retry = Retry(remove_headers_on_redirect=["X-API-Secret"])
|
||||||
|
|
||||||
|
- assert list(retry.remove_headers_on_redirect) == ["x-api-secret"]
|
||||||
|
+ assert retry.remove_headers_on_redirect == {"x-api-secret"}
|
||||||
|
|
||||||
|
@pytest.mark.parametrize("value", ["-1", "+1", "1.0", six.u("\xb2")]) # \xb2 = ^2
|
||||||
|
def test_parse_retry_after_invalid(self, value):
|
||||||
|
diff --git a/test/with_dummyserver/test_poolmanager.py b/test/with_dummyserver/test_poolmanager.py
|
||||||
|
index fa07a372a9..02a38115c5 100644
|
||||||
|
--- a/test/with_dummyserver/test_poolmanager.py
|
||||||
|
+++ b/test/with_dummyserver/test_poolmanager.py
|
||||||
|
@@ -141,7 +141,7 @@ def test_redirect_cross_host_remove_headers(self):
|
||||||
|
"GET",
|
||||||
|
"%s/redirect" % self.base_url,
|
||||||
|
fields={"target": "%s/headers" % self.base_url_alt},
|
||||||
|
- headers={"Authorization": "foo"},
|
||||||
|
+ headers={"Authorization": "foo", "Cookie": "foo=bar"},
|
||||||
|
)
|
||||||
|
|
||||||
|
assert r.status == 200
|
||||||
|
@@ -149,12 +149,13 @@ def test_redirect_cross_host_remove_headers(self):
|
||||||
|
data = json.loads(r.data.decode("utf-8"))
|
||||||
|
|
||||||
|
assert "Authorization" not in data
|
||||||
|
+ assert "Cookie" not in data
|
||||||
|
|
||||||
|
r = http.request(
|
||||||
|
"GET",
|
||||||
|
"%s/redirect" % self.base_url,
|
||||||
|
fields={"target": "%s/headers" % self.base_url_alt},
|
||||||
|
- headers={"authorization": "foo"},
|
||||||
|
+ headers={"authorization": "foo", "cookie": "foo=bar"},
|
||||||
|
)
|
||||||
|
|
||||||
|
assert r.status == 200
|
||||||
|
@@ -163,6 +164,8 @@ def test_redirect_cross_host_remove_headers(self):
|
||||||
|
|
||||||
|
assert "authorization" not in data
|
||||||
|
assert "Authorization" not in data
|
||||||
|
+ assert "cookie" not in data
|
||||||
|
+ assert "Cookie" not in data
|
||||||
|
|
||||||
|
def test_redirect_cross_host_no_remove_headers(self):
|
||||||
|
with PoolManager() as http:
|
||||||
|
@@ -170,7 +173,7 @@ def test_redirect_cross_host_no_remove_headers(self):
|
||||||
|
"GET",
|
||||||
|
"%s/redirect" % self.base_url,
|
||||||
|
fields={"target": "%s/headers" % self.base_url_alt},
|
||||||
|
- headers={"Authorization": "foo"},
|
||||||
|
+ headers={"Authorization": "foo", "Cookie": "foo=bar"},
|
||||||
|
retries=Retry(remove_headers_on_redirect=[]),
|
||||||
|
)
|
||||||
|
|
||||||
|
@@ -179,6 +182,7 @@ def test_redirect_cross_host_no_remove_headers(self):
|
||||||
|
data = json.loads(r.data.decode("utf-8"))
|
||||||
|
|
||||||
|
assert data["Authorization"] == "foo"
|
||||||
|
+ assert data["Cookie"] == "foo=bar"
|
||||||
|
|
||||||
|
def test_redirect_cross_host_set_removed_headers(self):
|
||||||
|
with PoolManager() as http:
|
||||||
|
@@ -186,7 +190,11 @@ def test_redirect_cross_host_set_removed_headers(self):
|
||||||
|
"GET",
|
||||||
|
"%s/redirect" % self.base_url,
|
||||||
|
fields={"target": "%s/headers" % self.base_url_alt},
|
||||||
|
- headers={"X-API-Secret": "foo", "Authorization": "bar"},
|
||||||
|
+ headers={
|
||||||
|
+ "X-API-Secret": "foo",
|
||||||
|
+ "Authorization": "bar",
|
||||||
|
+ "Cookie": "foo=bar",
|
||||||
|
+ },
|
||||||
|
retries=Retry(remove_headers_on_redirect=["X-API-Secret"]),
|
||||||
|
)
|
||||||
|
|
||||||
|
@@ -196,12 +204,17 @@ def test_redirect_cross_host_set_removed_headers(self):
|
||||||
|
|
||||||
|
assert "X-API-Secret" not in data
|
||||||
|
assert data["Authorization"] == "bar"
|
||||||
|
+ assert data["Cookie"] == "foo=bar"
|
||||||
|
|
||||||
|
r = http.request(
|
||||||
|
"GET",
|
||||||
|
"%s/redirect" % self.base_url,
|
||||||
|
fields={"target": "%s/headers" % self.base_url_alt},
|
||||||
|
- headers={"x-api-secret": "foo", "authorization": "bar"},
|
||||||
|
+ headers={
|
||||||
|
+ "x-api-secret": "foo",
|
||||||
|
+ "authorization": "bar",
|
||||||
|
+ "cookie": "foo=bar",
|
||||||
|
+ },
|
||||||
|
retries=Retry(remove_headers_on_redirect=["X-API-Secret"]),
|
||||||
|
)
|
||||||
|
|
||||||
|
@@ -212,6 +225,7 @@ def test_redirect_cross_host_set_removed_headers(self):
|
||||||
|
assert "x-api-secret" not in data
|
||||||
|
assert "X-API-Secret" not in data
|
||||||
|
assert data["Authorization"] == "bar"
|
||||||
|
+ assert data["Cookie"] == "foo=bar"
|
||||||
|
|
||||||
|
def test_redirect_without_preload_releases_connection(self):
|
||||||
|
with PoolManager(block=True, maxsize=2) as http:
|
||||||
@ -3,7 +3,7 @@
|
|||||||
|
|
||||||
Name: python-%{srcname}
|
Name: python-%{srcname}
|
||||||
Version: 1.25.9
|
Version: 1.25.9
|
||||||
Release: 8
|
Release: 9
|
||||||
Summary: Sanity-friendly HTTP client for Python
|
Summary: Sanity-friendly HTTP client for Python
|
||||||
License: MIT
|
License: MIT
|
||||||
URL: https://urllib3.readthedocs.io
|
URL: https://urllib3.readthedocs.io
|
||||||
@ -19,6 +19,7 @@ Patch6003: backport-add-server_hostname-to-SSL_KEYWORDS.patch
|
|||||||
Patch6004: backport-strip-leading-zeros-form-ports.patch
|
Patch6004: backport-strip-leading-zeros-form-ports.patch
|
||||||
Patch6005: backport-fixed-issue-with-port-0-returning-None.patch
|
Patch6005: backport-fixed-issue-with-port-0-returning-None.patch
|
||||||
Patch6006: backport-fix-NRESERVED_PAT-and-_idna_encode.patch
|
Patch6006: backport-fix-NRESERVED_PAT-and-_idna_encode.patch
|
||||||
|
Patch6007: CVE-2023-43804.patch
|
||||||
|
|
||||||
%global _description \
|
%global _description \
|
||||||
HTTP library with thread-safe connection pooling, file post support,\
|
HTTP library with thread-safe connection pooling, file post support,\
|
||||||
@ -120,6 +121,9 @@ PYTHONPATH=%{buildroot}%{python3_sitelib}:%{python3_sitelib} %{__python3} -m pyt
|
|||||||
%{python3_sitelib}/urllib3-*.egg-info
|
%{python3_sitelib}/urllib3-*.egg-info
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Wed Oct 04 2023 Funda Wang <fundawang@yeah.net> - 1.25.9-9
|
||||||
|
- fix CVE-2023-43804
|
||||||
|
|
||||||
* Sun Apr 23 2023 xzf1244 <xzff@hust.edu.cn> - 1.25.9-8
|
* Sun Apr 23 2023 xzf1244 <xzff@hust.edu.cn> - 1.25.9-8
|
||||||
- Type:bugfix
|
- Type:bugfix
|
||||||
- CVE:NA
|
- CVE:NA
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user