Skip to content

Commit 4536b2e

Browse files
miss-islingtonethanfurmangpsheadJelleZijlstra
authored
[3.11] gh-104049: do not expose on-disk location from SimpleHTTPRequestHandler (GH-104067) (#104123)
gh-104049: do not expose on-disk location from SimpleHTTPRequestHandler (GH-104067) Do not expose the local server's on-disk location from `SimpleHTTPRequestHandler` when generating a directory index. (unnecessary information disclosure) --------- (cherry picked from commit c7c3a60) Co-authored-by: Ethan Furman <[email protected]> Co-authored-by: Gregory P. Smith <[email protected]> Co-authored-by: Jelle Zijlstra <[email protected]>
1 parent 5386730 commit 4536b2e

File tree

3 files changed

+11
-1
lines changed

3 files changed

+11
-1
lines changed

Lib/http/server.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -790,7 +790,7 @@ def list_directory(self, path):
790790
displaypath = urllib.parse.unquote(self.path,
791791
errors='surrogatepass')
792792
except UnicodeDecodeError:
793-
displaypath = urllib.parse.unquote(path)
793+
displaypath = urllib.parse.unquote(self.path)
794794
displaypath = html.escape(displaypath, quote=False)
795795
enc = sys.getfilesystemencoding()
796796
title = f'Directory listing for {displaypath}'

Lib/test/test_httpservers.py

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -418,6 +418,14 @@ def test_undecodable_filename(self):
418418
self.check_status_and_reason(response, HTTPStatus.OK,
419419
data=os_helper.TESTFN_UNDECODABLE)
420420

421+
def test_undecodable_parameter(self):
422+
# sanity check using a valid parameter
423+
response = self.request(self.base_url + '/?x=123').read()
424+
self.assertRegex(response, f'listing for {self.base_url}/\?x=123'.encode('latin1'))
425+
# now the bogus encoding
426+
response = self.request(self.base_url + '/?x=%bb').read()
427+
self.assertRegex(response, f'listing for {self.base_url}/\?x=\xef\xbf\xbd'.encode('latin1'))
428+
421429
def test_get_dir_redirect_location_domain_injection_bug(self):
422430
"""Ensure //evil.co/..%2f../../X does not put //evil.co/ in Location.
423431
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
Do not expose the local on-disk location in directory indexes
2+
produced by :class:`http.client.SimpleHTTPRequestHandler`.

0 commit comments

Comments
 (0)