summaryrefslogtreecommitdiff
path: root/std/textproto/mod.ts
diff options
context:
space:
mode:
authorAndrew Stucki <andrew.stucki@gmail.com>2020-04-06 09:58:46 -0400
committerGitHub <noreply@github.com>2020-04-06 09:58:46 -0400
commit1e478d73e3e031c78a170b195021aeb22fd45feb (patch)
treec9565665265c0d20dc553bdf2f75c38c07ad4e8b /std/textproto/mod.ts
parent703c0b7c172c57353ed61b16966c4ff7072d47f3 (diff)
Drop headers with trailing whitespace in header name (#4642)
This relates directly to [an issue](https://github.com/denoland/deno_std/issues/620) that I initially raised in `deno_std` awhile back, and was reminded about it today when the `oak` project popped up on my github recommended repos. As of now Deno's http servers are vulnerable to the same underlying issue of go CVE-2019-16276 due to the fact that it's based off of ported go code from their old standard library. [Here's the commit that fixed the CVE.](https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8) Long story short, some off the shelf proxies and caching servers allow for passing unaltered malformed headers to backends that they're fronting. When they pass invalid headers that they don't understand this can cause issues with HTTP request smuggling. I believe that to this date, this is the default behavior of AWS ALBs--meaning any server that strips whitespace from the tail end of header field names and then interprets the header, when placed behind an ALB, is susceptible to request smuggling. The current behavior is actually specifically called out in [RFC 7230](https://tools.ietf.org/html/rfc7230#section-3.2.4) as something that MUST result in a rejected message, but the change corresponding to this PR, is more lenient and what both go and nginx currently do, and is better than the current behavior.
Diffstat (limited to 'std/textproto/mod.ts')
-rw-r--r--std/textproto/mod.ts10
1 files changed, 2 insertions, 8 deletions
diff --git a/std/textproto/mod.ts b/std/textproto/mod.ts
index 06ffb7364..218ec9d44 100644
--- a/std/textproto/mod.ts
+++ b/std/textproto/mod.ts
@@ -74,22 +74,16 @@ export class TextProtoReader {
if (kv === Deno.EOF) throw new Deno.errors.UnexpectedEof();
if (kv.byteLength === 0) return m;
- // Key ends at first colon; should not have trailing spaces
- // but they appear in the wild, violating specs, so we remove
- // them if present.
+ // Key ends at first colon
let i = kv.indexOf(charCode(":"));
if (i < 0) {
throw new Deno.errors.InvalidData(
`malformed MIME header line: ${str(kv)}`
);
}
- let endKey = i;
- while (endKey > 0 && kv[endKey - 1] == charCode(" ")) {
- endKey--;
- }
//let key = canonicalMIMEHeaderKey(kv.subarray(0, endKey));
- const key = str(kv.subarray(0, endKey));
+ const key = str(kv.subarray(0, i));
// As per RFC 7230 field-name is a token,
// tokens consist of one or more chars.