changeset: 92455:07b928530cdf parent: 92451:9f7b97fac919 parent: 92454:ba86978c8ab5 user: Senthil Kumaran date: Wed Sep 17 16:32:46 2014 +0800 files: Lib/test/test_wsgiref.py Misc/ACKS Misc/NEWS description: Merge from 3.4 Issue #22419: Limit the length of incoming HTTP request in wsgiref server to 65536 bytes. diff -r 9f7b97fac919 -r 07b928530cdf Lib/test/test_wsgiref.py --- a/Lib/test/test_wsgiref.py Wed Sep 17 13:19:34 2014 +0800 +++ b/Lib/test/test_wsgiref.py Wed Sep 17 16:32:46 2014 +0800 @@ -118,6 +118,11 @@ out, err = run_amock() self.check_hello(out) + def test_request_length(self): + out, err = run_amock(data=b"GET " + (b"x" * 65537) + b" HTTP/1.0\n\n") + self.assertEqual(out.splitlines()[0], + b"HTTP/1.0 414 Request-URI Too Long") + def test_validated_hello(self): out, err = run_amock(validator(hello_app)) # the middleware doesn't support len(), so content-length isn't there diff -r 9f7b97fac919 -r 07b928530cdf Lib/wsgiref/simple_server.py --- a/Lib/wsgiref/simple_server.py Wed Sep 17 13:19:34 2014 +0800 +++ b/Lib/wsgiref/simple_server.py Wed Sep 17 16:32:46 2014 +0800 @@ -115,7 +115,14 @@ def handle(self): """Handle a single HTTP request""" - self.raw_requestline = self.rfile.readline() + self.raw_requestline = self.rfile.readline(65537) + if len(self.raw_requestline) > 65536: + self.requestline = '' + self.request_version = '' + self.command = '' + self.send_error(414) + return + if not self.parse_request(): # An error code has been sent, just exit return diff -r 9f7b97fac919 -r 07b928530cdf Misc/ACKS --- a/Misc/ACKS Wed Sep 17 13:19:34 2014 +0800 +++ b/Misc/ACKS Wed Sep 17 16:32:46 2014 +0800 @@ -274,6 +274,7 @@ Phil Connell Juan José Conti Matt Conway +Devin Cook David M. Cooke Jason R. Coombs Garrett Cooper diff -r 9f7b97fac919 -r 07b928530cdf Misc/NEWS --- a/Misc/NEWS Wed Sep 17 13:19:34 2014 +0800 +++ b/Misc/NEWS Wed Sep 17 16:32:46 2014 +0800 @@ -132,6 +132,10 @@ Library ------- +- Issue #22419: Limit the length of incoming HTTP request in wsgiref server to + 65536 bytes and send a 414 error code for higher lengths. Patch contributed + by Devin Cook. + - Lax cookie parsing in http.cookies could be a security issue when combined with non-standard cookie handling in some Web browsers. Reported by Sergey Bobrov.