[ 
https://issues.apache.org/jira/browse/CXF-6579?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14735047#comment-14735047
 ] 

Sergey Beryozkin commented on CXF-6579:
---------------------------------------

If I replace the code as suggested I have these two DataFormatException tests 
failing:

testInvalidContent
testInvalidContentAfterBase64

Note I added those tests in response to:

https://issues.apache.org/jira/browse/CXF-5390

This all revolves around the existing code that gets the token inflated and 
therefore one option is just to drop these 2 tests if we replace the code as 
you suggested.

However, clearly "invalid_grant".getBytes() is not a valid deflated sequence 
and as such why exactly the code you suggested does not throw 
DataFormatException ? 

If the existing inflation code does not work for higher compression rates then 
why can't we fix it as opposed to completely remove it.

I'm sure that directly working with Inflater is also viable in a sense that it 
should support various compression rates, therefore IMHO we need to tune the 
existing code to ensure we have an early failure in case of invalid sequences.

Can you please review the existing code and see how it can be fixed ? 
 


> Inflated tokens can be corrupted if compression ratio is greater than 2:1
> -------------------------------------------------------------------------
>
>                 Key: CXF-6579
>                 URL: https://issues.apache.org/jira/browse/CXF-6579
>             Project: CXF
>          Issue Type: Bug
>          Components: Core, JAX-RS Security
>    Affects Versions: 3.0.6, 2.7.17, 3.1.2
>            Reporter: Phillip Klinefelter
>            Assignee: Sergey Beryozkin
>            Priority: Critical
>             Fix For: 3.1.3, 2.7.18, 3.0.7
>
>
> DeflateEncoderDecoder/CompressionUtils inflate method assumes that the 
> compression ratio will be 2:1.  That assumption is not true for SAML tokens 
> with many similar attribute statements.  The inflated token will be corrupted 
> with a portion of the token replaced with null characters.
> https://github.com/apache/cxf/blob/cxf-2.7.17/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/saml/DeflateEncoderDecoder.java#L34
> https://github.com/apache/cxf/blob/cxf-3.0.6/core/src/main/java/org/apache/cxf/common/util/CompressionUtils.java#L41
> https://github.com/apache/cxf/blob/cxf-3.1.2/core/src/main/java/org/apache/cxf/common/util/CompressionUtils.java#L41
> {code}
>     @Test
>     public void testInflateDeflateWithTokenDuplication() throws Exception {
>         String token = "valid_grant valid_grant valid_grant valid_grant 
> valid_grant valid_grant";
>         DeflateEncoderDecoder deflateEncoderDecoder = new 
> DeflateEncoderDecoder();
>         byte[] deflatedToken = 
> deflateEncoderDecoder.deflateToken(token.getBytes());
>         String cxfInflatedToken = IOUtils
>                 .toString(deflateEncoderDecoder.inflateToken(deflatedToken));
>         String streamInflatedToken = IOUtils.toString(
>                 new InflaterInputStream(new 
> ByteArrayInputStream(deflatedToken),
>                         new Inflater(true)));
>         assertThat(streamInflatedToken, is(token));
>         assertThat(cxfInflatedToken, is(token));
>     }
> {code}
> The stream inflated token is correct but the CXF inflated token is invalid.
> {code}
> java.lang.AssertionError: 
> Expected: is "valid_grant valid_grant valid_grant valid_grant valid_grant 
> valid_grant"
>      got: "t valid_grant valid_grant valid_grant"
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to