Skip to content

Commit 494de65

Browse files
bukkaremicollet
authored andcommitted
Fix GHSA-c5f2-jwm7-mmq2: stream HTTP fulluri CRLF injection
(cherry picked from commit 426a6d4539ebee34879ac5de857036bb6ff0e732) (cherry picked from commit bc1f192) (cherry picked from commit 8d130e1)
1 parent 0530cbf commit 494de65

File tree

2 files changed

+40
-6
lines changed

2 files changed

+40
-6
lines changed

ext/standard/http_fopen_wrapper.c

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -186,6 +186,11 @@ static php_stream *php_stream_url_wrap_http_ex(php_stream_wrapper *wrapper,
186186
return NULL;
187187
}
188188

189+
/* Should we send the entire path in the request line, default to no. */
190+
if (context && (tmpzval = php_stream_context_get_option(context, "http", "request_fulluri")) != NULL) {
191+
request_fulluri = zend_is_true(tmpzval);
192+
}
193+
189194
use_ssl = resource->scheme && (ZSTR_LEN(resource->scheme) > 4) && ZSTR_VAL(resource->scheme)[4] == 's';
190195
/* choose default ports */
191196
if (use_ssl && resource->port == 0)
@@ -205,6 +210,13 @@ static php_stream *php_stream_url_wrap_http_ex(php_stream_wrapper *wrapper,
205210
}
206211
}
207212

213+
if (request_fulluri && (strchr(path, '\n') != NULL || strchr(path, '\r') != NULL)) {
214+
php_stream_wrapper_log_error(wrapper, options, "HTTP wrapper full URI path does not allow CR or LF characters");
215+
php_url_free(resource);
216+
efree(transport_string);
217+
return NULL;
218+
}
219+
208220
if (context && (tmpzval = php_stream_context_get_option(context, wrapper->wops->label, "timeout")) != NULL) {
209221
double d = zval_get_double(tmpzval);
210222
#ifndef PHP_WIN32
@@ -385,12 +397,6 @@ static php_stream *php_stream_url_wrap_http_ex(php_stream_wrapper *wrapper,
385397
smart_str_appends(&req_buf, "GET ");
386398
}
387399

388-
/* Should we send the entire path in the request line, default to no. */
389-
if (!request_fulluri && context &&
390-
(tmpzval = php_stream_context_get_option(context, "http", "request_fulluri")) != NULL) {
391-
request_fulluri = zend_is_true(tmpzval);
392-
}
393-
394400
if (request_fulluri) {
395401
/* Ask for everything */
396402
smart_str_appends(&req_buf, path);
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
--TEST--
2+
GHSA-c5f2-jwm7-mmq2 (Configuring a proxy in a stream context might allow for CRLF injection in URIs)
3+
--INI--
4+
allow_url_fopen=1
5+
--CONFLICTS--
6+
server
7+
--FILE--
8+
<?php
9+
$serverCode = <<<'CODE'
10+
echo $_SERVER['REQUEST_URI'];
11+
CODE;
12+
13+
include __DIR__."/../../../../sapi/cli/tests/php_cli_server.inc";
14+
php_cli_server_start($serverCode, null, []);
15+
16+
$host = PHP_CLI_SERVER_ADDRESS;
17+
$userinput = "index.php HTTP/1.1\r\nHost: $host\r\n\r\nGET /index2.php HTTP/1.1\r\nHost: $host\r\n\r\nGET /index.php";
18+
$context = stream_context_create(['http' => ['proxy' => 'tcp://' . $host, 'request_fulluri' => true]]);
19+
echo file_get_contents("http://$host/$userinput", false, $context);
20+
?>
21+
--EXPECTF--
22+
Warning: file_get_contents(http://localhost:%d/index.php HTTP/1.1
23+
Host: localhost:%d
24+
25+
GET /index2.php HTTP/1.1
26+
Host: localhost:%d
27+
28+
GET /index.php): failed to open stream: HTTP wrapper full URI path does not allow CR or LF characters in %s on line %d

0 commit comments

Comments
 (0)