net/url, net/http/httputil: accept invalid percent encodings

Per https://url.spec.whatwg.org/#percent-encoded-bytes an invalid
percent encoding should be handled as ordinary text.

Fixes #56732

Change-Id: Ib0259dfd704922905289eebaacbf722e28f6d636
Reviewed-on: https://go-review.googlesource.com/c/go/+/450375
Run-TryBot: Ian Lance Taylor <iant@google.com>
Reviewed-by: Damien Neil <dneil@google.com>
Reviewed-by: Ian Lance Taylor <iant@google.com>
Auto-Submit: Ian Lance Taylor <iant@google.com>
Run-TryBot: Ian Lance Taylor <iant@golang.org>
TryBot-Result: Gopher Robot <gobot@golang.org>
This commit is contained in:
Ian Lance Taylor 2022-11-14 12:02:23 -08:00 committed by Gopher Robot
parent 2b59307ac2
commit e6ebbefaf8
4 changed files with 35 additions and 59 deletions

View file

@ -816,34 +816,9 @@ func (c switchProtocolCopier) copyToBackend(errc chan<- error) {
}
func cleanQueryParams(s string) string {
reencode := func(s string) string {
if strings.Contains(s, ";") {
v, _ := url.ParseQuery(s)
return v.Encode()
}
for i := 0; i < len(s); {
switch s[i] {
case ';':
return reencode(s)
case '%':
if i+2 >= len(s) || !ishex(s[i+1]) || !ishex(s[i+2]) {
return reencode(s)
}
i += 3
default:
i++
}
}
return s
}
func ishex(c byte) bool {
switch {
case '0' <= c && c <= '9':
return true
case 'a' <= c && c <= 'f':
return true
case 'A' <= c && c <= 'F':
return true
}
return false
}

View file

@ -1831,7 +1831,7 @@ func testReverseProxyQueryParameterSmuggling(t *testing.T, wantCleanQuery bool,
cleanQuery: "a=1",
}, {
rawQuery: "a=1&a=%zz&b=3",
cleanQuery: "a=1&b=3",
cleanQuery: "a=1&a=%zz&b=3",
}} {
res, err := frontend.Client().Get(frontend.URL + "?" + test.rawQuery)
if err != nil {

View file

@ -198,20 +198,24 @@ func PathUnescape(s string) (string, error) {
// unescape unescapes a string; the mode specifies
// which section of the URL string is being unescaped.
func unescape(s string, mode encoding) (string, error) {
isPercentEscape := func(s string, i int) bool {
return i+2 < len(s) && ishex(s[i+1]) && ishex(s[i+2])
}
// Count %, check that they're well-formed.
n := 0
hasPlus := false
for i := 0; i < len(s); {
switch s[i] {
case '%':
n++
if i+2 >= len(s) || !ishex(s[i+1]) || !ishex(s[i+2]) {
s = s[i:]
if len(s) > 3 {
s = s[:3]
}
return "", EscapeError(s)
if !isPercentEscape(s, i) {
// https://url.spec.whatwg.org/#percent-encoded-bytes
// says that % followed by non-hex characters
// should be accepted with no error.
i++
continue
}
n++
// Per https://tools.ietf.org/html/rfc3986#page-21
// in the host component %-encoding can only be used
// for non-ASCII bytes.
@ -255,8 +259,12 @@ func unescape(s string, mode encoding) (string, error) {
for i := 0; i < len(s); i++ {
switch s[i] {
case '%':
t.WriteByte(unhex(s[i+1])<<4 | unhex(s[i+2]))
i += 2
if !isPercentEscape(s, i) {
t.WriteByte('%')
} else {
t.WriteByte(unhex(s[i+1])<<4 | unhex(s[i+2]))
i += 2
}
case '+':
if mode == encodeQueryComponent {
t.WriteByte(' ')

View file

@ -704,9 +704,11 @@ var parseRequestURLTests = []struct {
// These two cases are valid as textual representations as
// described in RFC 4007, but are not valid as address
// literals with IPv6 zone identifiers in URIs as described in
// RFC 6874.
{"http://[fe80::1%en0]/", false},
{"http://[fe80::1%en0]:8080/", false},
// RFC 6874. However, this seems to be overridden by
// https://url.spec.whatwg.org/#percent-encoded-bytes
// which permits unencoded % characters.
{"http://[fe80::1%en0]/", true},
{"http://[fe80::1%en0]:8080/", true},
}
func TestParseRequestURI(t *testing.T) {
@ -896,28 +898,28 @@ var unescapeTests = []EscapeTest{
},
{
"%", // not enough characters after %
"",
EscapeError("%"),
"%",
nil,
},
{
"%a", // not enough characters after %
"",
EscapeError("%a"),
"%a",
nil,
},
{
"%1", // not enough characters after %
"",
EscapeError("%1"),
"%1",
nil,
},
{
"123%45%6", // not enough characters after %
"",
EscapeError("%6"),
"123E%6",
nil,
},
{
"%zzzzz", // invalid hex digits
"",
EscapeError("%zz"),
"%zzzzz",
nil,
},
{
"a+b",
@ -1591,16 +1593,6 @@ func TestRequestURI(t *testing.T) {
}
}
func TestParseFailure(t *testing.T) {
// Test that the first parse error is returned.
const url = "%gh&%ij"
_, err := ParseQuery(url)
errStr := fmt.Sprint(err)
if !strings.Contains(errStr, "%gh") {
t.Errorf(`ParseQuery(%q) returned error %q, want something containing %q"`, url, errStr, "%gh")
}
}
func TestParseErrors(t *testing.T) {
tests := []struct {
in string
@ -2118,6 +2110,7 @@ func TestJoinPath(t *testing.T) {
{
base: "http://[fe80::1%en0]:8080/",
elem: []string{"/go"},
out: "http://[fe80::1%25en0]:8080/go",
},
{
base: "https://go.googlesource.com",