[ 
https://issues.apache.org/jira/browse/HTTPCLIENT-1803?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Tyler Benson updated HTTPCLIENT-1803:
-------------------------------------
    Description: 
When using URIBuilder's constructor with a malformed url argument, host passed 
in by {{setHost}} call not honored.

{quote}
        String path = "@notexample.com/mypath"
        URI uri = new URIBuilder(path).setHost("example.com").build();
        org.junit.Assert.assertEquals("example.com", uri.getHost())
{quote}

This is caused by the original string being passed into the constructor being 
treated as the path, but not verifying the presence of a leading {{/}} 
character.
This can be seen with other arguments:

{{path = "example"}} -> {{//example.comexample}}

Fix:  URIBuilder should ensure path starts with a leading {{/}}.

Reason priority is considered Major:
In our case, this caused a security vulnerability which was discovered by 
researcher James Kettle (@albinowax on twitter). The user-provided path was 
able to override our specified host, resulting in giving network access to a 
sensitive environment.  We worked around this in our code by ensuring the 
leading {{/}}, but this seems like something better handled by the framework.

PS.  If you agree this should be fixed, I'm happy to submit a pull request.

  was:
When using URIBuilder's constructor with a malformed url argument, host passed 
in by {{setHost}} call not honored.

{quote}
        String path = "@notexample.com/mypath"
        URI uri = new URIBuilder(path).setHost("example.com").build();
        org.junit.Assert.assertEquals("example.com", uri.getHost())
{quote}

This is caused by the original string being passed into the constructor being 
treated as the path, but not verifying the presence of a leading {{/}} 
character.
This can be seen with other arguments:

{{path = "example"}} -> {{//example.comexample}}

Fix:  URIBuilder should ensure path starts with a leading {{/}}.

Reason priority is considered Major:
In our case, this caused a security vulnerability because the user provided 
path was able to override our specified host, resulting in giving network 
access to a sensitive environment.  We worked around this in our code by 
ensuring the leading {{/}}, but this seems like something better handled by the 
framework.

PS.  If you agree this should be fixed, I'm happy to submit a pull request.


> Malformed path not handled well
> -------------------------------
>
>                 Key: HTTPCLIENT-1803
>                 URL: https://issues.apache.org/jira/browse/HTTPCLIENT-1803
>             Project: HttpComponents HttpClient
>          Issue Type: Bug
>          Components: HttpClient (async), HttpClient (classic)
>    Affects Versions: 4.5.1
>            Reporter: Tyler Benson
>
> When using URIBuilder's constructor with a malformed url argument, host 
> passed in by {{setHost}} call not honored.
> {quote}
>         String path = "@notexample.com/mypath"
>         URI uri = new URIBuilder(path).setHost("example.com").build();
>         org.junit.Assert.assertEquals("example.com", uri.getHost())
> {quote}
> This is caused by the original string being passed into the constructor being 
> treated as the path, but not verifying the presence of a leading {{/}} 
> character.
> This can be seen with other arguments:
> {{path = "example"}} -> {{//example.comexample}}
> Fix:  URIBuilder should ensure path starts with a leading {{/}}.
> Reason priority is considered Major:
> In our case, this caused a security vulnerability which was discovered by 
> researcher James Kettle (@albinowax on twitter). The user-provided path was 
> able to override our specified host, resulting in giving network access to a 
> sensitive environment.  We worked around this in our code by ensuring the 
> leading {{/}}, but this seems like something better handled by the framework.
> PS.  If you agree this should be fixed, I'm happy to submit a pull request.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to