f594b0
From 9f6aa6b5f06ecfcfea2084d88f377c6e9dba5ce2 Mon Sep 17 00:00:00 2001
f594b0
From: Ryan Petrello <rpetrell@redhat.com>
f594b0
Date: Tue, 30 Apr 2019 12:36:48 -0400
f594b0
Subject: [PATCH 1/3] prevent CVE-2019-9740 in 1.24.x
f594b0
f594b0
adapted from https://github.com/python/cpython/pull/12755
f594b0
---
f594b0
 test/test_util.py   | 5 +++++
f594b0
 src/urllib3/util/url.py | 8 ++++++++
f594b0
 2 files changed, 13 insertions(+)
f594b0
f594b0
diff --git a/test/test_util.py b/test/test_util.py
f594b0
index 73d9452..dc6ffd0 100644
f594b0
--- a/test/test_util.py
f594b0
+++ b/test/test_util.py
f594b0
@@ -200,6 +200,11 @@ class TestUtil(object):
f594b0
         with pytest.raises(ValueError):
f594b0
             parse_url('[::1')
f594b0
 
f594b0
+    def test_parse_url_contains_control_characters(self):
f594b0
+        # see CVE-2019-9740
f594b0
+        with pytest.raises(LocationParseError):
f594b0
+            parse_url('http://localhost:8000/ HTTP/1.1\r\nHEADER: INJECTED\r\nIgnore:')
f594b0
+
f594b0
     def test_Url_str(self):
f594b0
         U = Url('http', host='google.com')
f594b0
         assert str(U) == U.url
f594b0
diff --git a/src/urllib3/util/url.py b/src/urllib3/util/url.py
f594b0
index 6b6f996..e8e1bd7 100644
f594b0
--- a/src/urllib3/util/url.py
f594b0
+++ b/src/urllib3/util/url.py
f594b0
@@ -1,5 +1,6 @@
f594b0
 from __future__ import absolute_import
f594b0
 from collections import namedtuple
f594b0
+import re
f594b0
 
f594b0
 from ..exceptions import LocationParseError
f594b0
 
f594b0
@@ -10,6 +11,8 @@ url_attrs = ['scheme', 'auth', 'host', 'port', 'path', 'query', 'fragment']
f594b0
 # urllib3 infers URLs without a scheme (None) to be http.
f594b0
 NORMALIZABLE_SCHEMES = ('http', 'https', None)
f594b0
 
f594b0
+_contains_disallowed_url_pchar_re = re.compile('[\x00-\x20\x7f]')
f594b0
+
f594b0
 
f594b0
 class Url(namedtuple('Url', url_attrs)):
f594b0
     """
f594b0
@@ -155,6 +158,11 @@ def parse_url(url):
f594b0
         # Empty
f594b0
         return Url()
f594b0
 
f594b0
+    # Prevent CVE-2019-9740.
f594b0
+    # adapted from https://github.com/python/cpython/pull/12755
f594b0
+    if _contains_disallowed_url_pchar_re.search(url):
f594b0
+        raise LocationParseError("URL can't contain control characters. {!r}".format(url))
f594b0
+
f594b0
     scheme = None
f594b0
     auth = None
f594b0
     host = None
f594b0
-- 
f594b0
2.20.1
f594b0
f594b0
f594b0
From ecc15bd412354ad916712113b0e426f8bc6cf52d Mon Sep 17 00:00:00 2001
f594b0
From: Ryan Petrello <lists@ryanpetrello.com>
f594b0
Date: Wed, 1 May 2019 16:46:44 -0400
f594b0
Subject: [PATCH 2/3] avoid CVE-2019-9740 by percent-encoding invalid path
f594b0
 characters
f594b0
f594b0
this is to avoid breaking changes in downstream libraries like requests
f594b0
---
f594b0
 test/test_util.py   | 4 ++--
f594b0
 src/urllib3/util/url.py | 4 ++--
f594b0
 2 files changed, 4 insertions(+), 4 deletions(-)
f594b0
f594b0
diff --git a/test/test_util.py b/test/test_util.py
f594b0
index dc6ffd0..d139329 100644
f594b0
--- a/test/test_util.py
f594b0
+++ b/test/test_util.py
f594b0
@@ -202,8 +202,8 @@ class TestUtil(object):
f594b0
 
f594b0
     def test_parse_url_contains_control_characters(self):
f594b0
         # see CVE-2019-9740
f594b0
-        with pytest.raises(LocationParseError):
f594b0
-            parse_url('http://localhost:8000/ HTTP/1.1\r\nHEADER: INJECTED\r\nIgnore:')
f594b0
+        url = parse_url('http://localhost:8000/ HTTP/1.1\r\nHEADER: INJECTED\r\nIgnore:')
f594b0
+        assert url.path == '/%20HTTP/1.1%0D%0AHEADER:%20INJECTED%0D%0AIgnore:'
f594b0
 
f594b0
     def test_Url_str(self):
f594b0
         U = Url('http', host='google.com')
f594b0
diff --git a/src/urllib3/util/url.py b/src/urllib3/util/url.py
f594b0
index e8e1bd7..12b8d55 100644
f594b0
--- a/src/urllib3/util/url.py
f594b0
+++ b/src/urllib3/util/url.py
f594b0
@@ -3,6 +3,7 @@ from collections import namedtuple
f594b0
 import re
f594b0
 
f594b0
 from ..exceptions import LocationParseError
f594b0
+from ..packages.six.moves.urllib.parse import quote
f594b0
 
f594b0
 
f594b0
 url_attrs = ['scheme', 'auth', 'host', 'port', 'path', 'query', 'fragment']
f594b0
@@ -160,8 +161,7 @@ def parse_url(url):
f594b0
 
f594b0
     # Prevent CVE-2019-9740.
f594b0
     # adapted from https://github.com/python/cpython/pull/12755
f594b0
-    if _contains_disallowed_url_pchar_re.search(url):
f594b0
-        raise LocationParseError("URL can't contain control characters. {!r}".format(url))
f594b0
+    url = _contains_disallowed_url_pchar_re.sub(lambda match: quote(match.group()), url)
f594b0
 
f594b0
     scheme = None
f594b0
     auth = None
f594b0
-- 
f594b0
2.20.1
f594b0
f594b0
f594b0
From 6cda449df587fd37135ee76a9253dc8e12e53c05 Mon Sep 17 00:00:00 2001
f594b0
From: Seth Michael Larson <sethmichaellarson@gmail.com>
f594b0
Date: Thu, 2 May 2019 09:02:24 -0500
f594b0
Subject: [PATCH 3/3] Also test unicode and query
f594b0
f594b0
---
f594b0
 test/test_util.py | 22 +++++++++++++++++++---
f594b0
 1 file changed, 19 insertions(+), 3 deletions(-)
f594b0
f594b0
diff --git a/test/test_util.py b/test/test_util.py
f594b0
index d139329..fa53aaf 100644
f594b0
--- a/test/test_util.py
f594b0
+++ b/test/test_util.py
f594b0
@@ -200,10 +200,26 @@ class TestUtil(object):
f594b0
         with pytest.raises(ValueError):
f594b0
             parse_url('[::1')
f594b0
 
f594b0
-    def test_parse_url_contains_control_characters(self):
f594b0
+    @pytest.mark.parametrize('url, expected_url', [
f594b0
+        (
f594b0
+            'http://localhost/ HTTP/1.1\r\nHEADER: INJECTED\r\nIgnore:',
f594b0
+            Url('http', host='localhost', port=None,
f594b0
+                path='/%20HTTP/1.1%0D%0AHEADER:%20INJECTED%0D%0AIgnore:')
f594b0
+        ),
f594b0
+        (
f594b0
+            u'http://localhost/ HTTP/1.1\r\nHEADER: INJECTED\r\nIgnore:',
f594b0
+            Url('http', host='localhost', port=None,
f594b0
+                path='/%20HTTP/1.1%0D%0AHEADER:%20INJECTED%0D%0AIgnore:')
f594b0
+        ),
f594b0
+        (
f594b0
+            'http://localhost/ ?q=\r\n',
f594b0
+            Url('http', host='localhost', path='/%20', query='q=%0D%0A')
f594b0
+        ),
f594b0
+    ])
f594b0
+    def test_parse_url_contains_control_characters(self, url, expected_url):
f594b0
         # see CVE-2019-9740
f594b0
-        url = parse_url('http://localhost:8000/ HTTP/1.1\r\nHEADER: INJECTED\r\nIgnore:')
f594b0
-        assert url.path == '/%20HTTP/1.1%0D%0AHEADER:%20INJECTED%0D%0AIgnore:'
f594b0
+        url = parse_url(url)
f594b0
+        assert url == expected_url
f594b0
 
f594b0
     def test_Url_str(self):
f594b0
         U = Url('http', host='google.com')
f594b0
-- 
f594b0
2.20.1
f594b0