This commit is contained in:
Benjamin Peterson 2013-10-30 12:48:59 -04:00
commit 35aca89617
3 changed files with 18 additions and 5 deletions

View File

@ -968,18 +968,17 @@ class CGIHTTPRequestHandler(SimpleHTTPRequestHandler):
def run_cgi(self): def run_cgi(self):
"""Execute a CGI script.""" """Execute a CGI script."""
path = self.path
dir, rest = self.cgi_info dir, rest = self.cgi_info
i = path.find('/', len(dir) + 1) i = rest.find('/')
while i >= 0: while i >= 0:
nextdir = path[:i] nextdir = rest[:i]
nextrest = path[i+1:] nextrest = rest[i+1:]
scriptdir = self.translate_path(nextdir) scriptdir = self.translate_path(nextdir)
if os.path.isdir(scriptdir): if os.path.isdir(scriptdir):
dir, rest = nextdir, nextrest dir, rest = nextdir, nextrest
i = path.find('/', len(dir) + 1) i = rest.find('/')
else: else:
break break

View File

@ -322,6 +322,7 @@ class CGIHTTPServerTestCase(BaseTestCase):
self.parent_dir = tempfile.mkdtemp() self.parent_dir = tempfile.mkdtemp()
self.cgi_dir = os.path.join(self.parent_dir, 'cgi-bin') self.cgi_dir = os.path.join(self.parent_dir, 'cgi-bin')
os.mkdir(self.cgi_dir) os.mkdir(self.cgi_dir)
self.nocgi_path = None
self.file1_path = None self.file1_path = None
self.file2_path = None self.file2_path = None
@ -342,6 +343,11 @@ class CGIHTTPServerTestCase(BaseTestCase):
self.tearDown() self.tearDown()
self.skipTest("Python executable path is not encodable to utf-8") self.skipTest("Python executable path is not encodable to utf-8")
self.nocgi_path = os.path.join(self.parent_dir, 'nocgi.py')
with open(self.nocgi_path, 'w') as fp:
fp.write(cgi_file1 % self.pythonexe)
os.chmod(self.nocgi_path, 0o777)
self.file1_path = os.path.join(self.cgi_dir, 'file1.py') self.file1_path = os.path.join(self.cgi_dir, 'file1.py')
with open(self.file1_path, 'w', encoding='utf-8') as file1: with open(self.file1_path, 'w', encoding='utf-8') as file1:
file1.write(cgi_file1 % self.pythonexe) file1.write(cgi_file1 % self.pythonexe)
@ -359,6 +365,8 @@ class CGIHTTPServerTestCase(BaseTestCase):
os.chdir(self.cwd) os.chdir(self.cwd)
if self.pythonexe != sys.executable: if self.pythonexe != sys.executable:
os.remove(self.pythonexe) os.remove(self.pythonexe)
if self.nocgi_path:
os.remove(self.nocgi_path)
if self.file1_path: if self.file1_path:
os.remove(self.file1_path) os.remove(self.file1_path)
if self.file2_path: if self.file2_path:
@ -415,6 +423,10 @@ class CGIHTTPServerTestCase(BaseTestCase):
self.assertEqual((b'Hello World' + self.linesep, 'text/html', 200), self.assertEqual((b'Hello World' + self.linesep, 'text/html', 200),
(res.read(), res.getheader('Content-type'), res.status)) (res.read(), res.getheader('Content-type'), res.status))
def test_issue19435(self):
res = self.request('///////////nocgi.py/../cgi-bin/nothere.sh')
self.assertEqual(res.status, 404)
def test_post(self): def test_post(self):
params = urllib.parse.urlencode( params = urllib.parse.urlencode(
{'spam' : 1, 'eggs' : 'python', 'bacon' : 123456}) {'spam' : 1, 'eggs' : 'python', 'bacon' : 123456})

View File

@ -10,6 +10,8 @@ What's New in Python 3.2.6?
Library Library
------- -------
- Issue #19435: Fix directory traversal attack on CGIHttpRequestHandler.
- Issue #14984: On POSIX systems, when netrc is called without a filename - Issue #14984: On POSIX systems, when netrc is called without a filename
argument (and therefore is reading the user's $HOME/.netrc file), it now argument (and therefore is reading the user's $HOME/.netrc file), it now
enforces the same security rules as typical ftp clients: the .netrc file must enforces the same security rules as typical ftp clients: the .netrc file must