Skip to content

Commit

Permalink
early reject URI authority if too many ":" chars
Browse files Browse the repository at this point in the history
Signed-off-by: Michael Rodler <mrodler@amazon.de>
  • Loading branch information
Michael Rodler authored and seanmonstar committed Jun 12, 2023
1 parent 4756547 commit 4f28cbd
Showing 1 changed file with 11 additions and 1 deletion.
12 changes: 11 additions & 1 deletion src/uri/authority.rs
Expand Up @@ -69,12 +69,13 @@ impl Authority {
// Postcondition: for all Ok() returns, s[..ret.unwrap()] is valid UTF-8 where
// ret is the return value.
pub(super) fn parse(s: &[u8]) -> Result<usize, InvalidUri> {
let mut colon_cnt = 0;
let mut colon_cnt = 0u32;
let mut start_bracket = false;
let mut end_bracket = false;
let mut has_percent = false;
let mut end = s.len();
let mut at_sign_pos = None;
const MAX_COLONS: u32 = 8; // e.g., [FEDC:BA98:7654:3210:FEDC:BA98:7654:3210]:80

// Among other things, this loop checks that every byte in s up to the
// first '/', '?', or '#' is a valid URI character (or in some contexts,
Expand All @@ -87,6 +88,9 @@ impl Authority {
break;
}
b':' => {
if colon_cnt >= MAX_COLONS {
return Err(ErrorKind::InvalidAuthority.into());
}
colon_cnt += 1;
}
b'[' => {
Expand Down Expand Up @@ -644,6 +648,12 @@ mod tests {
assert_eq!(result, authority_str);
}

#[test]
fn reject_obviously_invalid_ipv6_address() {
let err = Authority::parse_non_empty(b"[0:1:2:3:4:5:6:7:8:9:10:11:12:13:14]").unwrap_err();
assert_eq!(err.0, ErrorKind::InvalidAuthority);
}

#[test]
fn rejects_percent_outside_ipv6_address() {
let err = Authority::parse_non_empty(b"1234%20[fe80::1:2:3:4]").unwrap_err();
Expand Down

0 comments on commit 4f28cbd

Please sign in to comment.