Skip to content

Commit 426a6d4

Browse files
committed
Fix GHSA-c5f2-jwm7-mmq2: stream HTTP fulluri CRLF injection
1 parent 69c5f68 commit 426a6d4

File tree

2 files changed

+40
-6
lines changed

2 files changed

+40
-6
lines changed

ext/standard/http_fopen_wrapper.c

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -183,6 +183,11 @@ static php_stream *php_stream_url_wrap_http_ex(php_stream_wrapper *wrapper,
183183
return NULL;
184184
}
185185

186+
/* Should we send the entire path in the request line, default to no. */
187+
if (context && (tmpzval = php_stream_context_get_option(context, "http", "request_fulluri")) != NULL) {
188+
request_fulluri = zend_is_true(tmpzval);
189+
}
190+
186191
use_ssl = resource->scheme && (ZSTR_LEN(resource->scheme) > 4) && ZSTR_VAL(resource->scheme)[4] == 's';
187192
/* choose default ports */
188193
if (use_ssl && resource->port == 0)
@@ -201,6 +206,13 @@ static php_stream *php_stream_url_wrap_http_ex(php_stream_wrapper *wrapper,
201206
}
202207
}
203208

209+
if (request_fulluri && (strchr(path, '\n') != NULL || strchr(path, '\r') != NULL)) {
210+
php_stream_wrapper_log_error(wrapper, options, "HTTP wrapper full URI path does not allow CR or LF characters");
211+
php_url_free(resource);
212+
zend_string_release(transport_string);
213+
return NULL;
214+
}
215+
204216
if (context && (tmpzval = php_stream_context_get_option(context, wrapper->wops->label, "timeout")) != NULL) {
205217
double d = zval_get_double(tmpzval);
206218
#ifndef PHP_WIN32
@@ -381,12 +393,6 @@ static php_stream *php_stream_url_wrap_http_ex(php_stream_wrapper *wrapper,
381393
smart_str_appends(&req_buf, "GET ");
382394
}
383395

384-
/* Should we send the entire path in the request line, default to no. */
385-
if (!request_fulluri && context &&
386-
(tmpzval = php_stream_context_get_option(context, "http", "request_fulluri")) != NULL) {
387-
request_fulluri = zend_is_true(tmpzval);
388-
}
389-
390396
if (request_fulluri) {
391397
/* Ask for everything */
392398
smart_str_appends(&req_buf, path);
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
--TEST--
2+
GHSA-c5f2-jwm7-mmq2 (Configuring a proxy in a stream context might allow for CRLF injection in URIs)
3+
--INI--
4+
allow_url_fopen=1
5+
--CONFLICTS--
6+
server
7+
--FILE--
8+
<?php
9+
$serverCode = <<<'CODE'
10+
echo $_SERVER['REQUEST_URI'];
11+
CODE;
12+
13+
include __DIR__."/../../../../sapi/cli/tests/php_cli_server.inc";
14+
php_cli_server_start($serverCode, null, []);
15+
16+
$host = PHP_CLI_SERVER_ADDRESS;
17+
$userinput = "index.php HTTP/1.1\r\nHost: $host\r\n\r\nGET /index2.php HTTP/1.1\r\nHost: $host\r\n\r\nGET /index.php";
18+
$context = stream_context_create(['http' => ['proxy' => 'tcp://' . $host, 'request_fulluri' => true]]);
19+
echo file_get_contents("http://$host/$userinput", false, $context);
20+
?>
21+
--EXPECTF--
22+
Warning: file_get_contents(http://localhost:%d/index.php HTTP/1.1
23+
Host: localhost:%d
24+
25+
GET /index2.php HTTP/1.1
26+
Host: localhost:%d
27+
28+
GET /index.php): Failed to open stream: HTTP wrapper full URI path does not allow CR or LF characters in %s on line %d

0 commit comments

Comments
 (0)