Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 0633515

Browse files
committedJul 7, 2021
fix(http1): reject content-lengths that have a plus sign prefix
The HTTP/1 content-length parser would accept lengths that were prefixed with a plus sign (for example, `+1234`). The specification restricts the content-length header to only allow DIGITs, making such a content-length illegal. Since some HTTP implementations protect against that, and others mis-interpret the length when the plus sign is present, this fixes hyper to always reject such content lengths. See GHSA-f3pg-qwvg-p99c
1 parent efd9a98 commit 0633515

File tree

3 files changed

+87
-6
lines changed

3 files changed

+87
-6
lines changed
 

‎src/headers.rs

+29-2
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ fn connection_has(value: &HeaderValue, needle: &str) -> bool {
3030

3131
#[cfg(all(feature = "http1", feature = "server"))]
3232
pub(super) fn content_length_parse(value: &HeaderValue) -> Option<u64> {
33-
value.to_str().ok().and_then(|s| s.parse().ok())
33+
from_digits(value.as_bytes())
3434
}
3535

3636
pub(super) fn content_length_parse_all(headers: &HeaderMap) -> Option<u64> {
@@ -46,7 +46,7 @@ pub(super) fn content_length_parse_all_values(values: ValueIter<'_, HeaderValue>
4646
for h in values {
4747
if let Ok(line) = h.to_str() {
4848
for v in line.split(',') {
49-
if let Some(n) = v.trim().parse().ok() {
49+
if let Some(n) = from_digits(v.trim().as_bytes()) {
5050
if content_length.is_none() {
5151
content_length = Some(n)
5252
} else if content_length != Some(n) {
@@ -64,6 +64,33 @@ pub(super) fn content_length_parse_all_values(values: ValueIter<'_, HeaderValue>
6464
return content_length
6565
}
6666

67+
fn from_digits(bytes: &[u8]) -> Option<u64> {
68+
// cannot use FromStr for u64, since it allows a signed prefix
69+
let mut result = 0u64;
70+
const RADIX: u64 = 10;
71+
72+
if bytes.is_empty() {
73+
return None;
74+
}
75+
76+
for &b in bytes {
77+
// can't use char::to_digit, since we haven't verified these bytes
78+
// are utf-8.
79+
match b {
80+
b'0'..=b'9' => {
81+
result = result.checked_mul(RADIX)?;
82+
result = result.checked_add((b - b'0') as u64)?;
83+
},
84+
_ => {
85+
// not a DIGIT, get outta here!
86+
return None;
87+
}
88+
}
89+
}
90+
91+
Some(result)
92+
}
93+
6794
#[cfg(all(feature = "http2", feature = "client"))]
6895
pub(super) fn method_has_defined_payload_semantics(method: &Method) -> bool {
6996
match *method {

‎src/proto/h1/role.rs

+20-4
Original file line numberDiff line numberDiff line change
@@ -219,10 +219,8 @@ impl Http1Transaction for Server {
219219
if is_te {
220220
continue;
221221
}
222-
let len = value
223-
.to_str()
224-
.map_err(|_| Parse::content_length_invalid())
225-
.and_then(|s| s.parse().map_err(|_| Parse::content_length_invalid()))?;
222+
let len = headers::content_length_parse(&value)
223+
.ok_or_else(Parse::content_length_invalid)?;
226224
if let Some(prev) = con_len {
227225
if prev != len {
228226
debug!(
@@ -1775,6 +1773,16 @@ mod tests {
17751773
"multiple content-lengths",
17761774
);
17771775

1776+
// content-length with prefix is not allowed
1777+
parse_err(
1778+
"\
1779+
POST / HTTP/1.1\r\n\
1780+
content-length: +10\r\n\
1781+
\r\n\
1782+
",
1783+
"prefixed content-length",
1784+
);
1785+
17781786
// transfer-encoding that isn't chunked is an error
17791787
parse_err(
17801788
"\
@@ -1958,6 +1966,14 @@ mod tests {
19581966
",
19591967
);
19601968

1969+
parse_err(
1970+
"\
1971+
HTTP/1.1 200 OK\r\n\
1972+
content-length: +8\r\n\
1973+
\r\n\
1974+
",
1975+
);
1976+
19611977
// transfer-encoding: chunked
19621978
assert_eq!(
19631979
parse(

‎tests/server.rs

+38
Original file line numberDiff line numberDiff line change
@@ -405,6 +405,44 @@ fn get_chunked_response_with_ka() {
405405
read_until(&mut req, |buf| buf.ends_with(quux)).expect("reading 2");
406406
}
407407

408+
#[test]
409+
fn post_with_content_length_body() {
410+
let server = serve();
411+
let mut req = connect(server.addr());
412+
req.write_all(
413+
b"\
414+
POST / HTTP/1.1\r\n\
415+
Content-Length: 5\r\n\
416+
\r\n\
417+
hello\
418+
",
419+
)
420+
.unwrap();
421+
req.read(&mut [0; 256]).unwrap();
422+
423+
assert_eq!(server.body(), b"hello");
424+
}
425+
426+
#[test]
427+
fn post_with_invalid_prefix_content_length() {
428+
let server = serve();
429+
let mut req = connect(server.addr());
430+
req.write_all(
431+
b"\
432+
POST / HTTP/1.1\r\n\
433+
Content-Length: +5\r\n\
434+
\r\n\
435+
hello\
436+
",
437+
)
438+
.unwrap();
439+
440+
let mut buf = [0; 256];
441+
let _n = req.read(&mut buf).unwrap();
442+
let expected = "HTTP/1.1 400 Bad Request\r\n";
443+
assert_eq!(s(&buf[..expected.len()]), expected);
444+
}
445+
408446
#[test]
409447
fn post_with_chunked_body() {
410448
let server = serve();

0 commit comments

Comments
 (0)