
This commit updates `ContentReader::read` to optionally close the underlying `Reader` when a message is read that does not terminate the DAP header immediately following the `Content-Length` header field. This fixes an infinite loop when parsing an invalid DAP message. In particular, the infinite loop occurs when a cross-site HTTP request from a browser running on the same host as a cppdap server is sent to the server. As cross-site requests to the localhost can be triggered by untrusted JavaScript, more validation of the DAP messages is required to protect cppdap-based servers from malicious requests. This commit introduces a new enum flag on both `Session` and `ContentReader` to allow a user to indicate that the underlying `Reader` should be closed when an invalid DAP message is received. The server example has been updated to indicate that invalid messages should result in closure of the underlying `Reader`.
127 lines
4.2 KiB
C++
127 lines
4.2 KiB
C++
// Copyright 2019 Google LLC
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// https://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
#include "content_stream.h"
|
|
|
|
#include "string_buffer.h"
|
|
|
|
#include "gmock/gmock.h"
|
|
#include "gtest/gtest.h"
|
|
|
|
#include <memory>
|
|
|
|
namespace {
|
|
|
|
// SingleByteReader wraps a dap::Reader to only provide a single byte for each
|
|
// read() call, regardless of the number of bytes actually requested.
|
|
class SingleByteReader : public dap::Reader {
|
|
public:
|
|
SingleByteReader(std::unique_ptr<dap::Reader>&& inner)
|
|
: inner(std::move(inner)) {}
|
|
|
|
bool isOpen() override { return inner->isOpen(); }
|
|
void close() override { return inner->close(); }
|
|
size_t read(void* buffer, size_t) override { return inner->read(buffer, 1); };
|
|
|
|
private:
|
|
std::unique_ptr<dap::Reader> inner;
|
|
};
|
|
|
|
} // namespace
|
|
|
|
TEST(ContentStreamTest, Write) {
|
|
auto sb = dap::StringBuffer::create();
|
|
auto ptr = sb.get();
|
|
dap::ContentWriter cw(std::move(sb));
|
|
cw.write("Content payload number one");
|
|
cw.write("Content payload number two");
|
|
cw.write("Content payload number three");
|
|
ASSERT_EQ(ptr->string(),
|
|
"Content-Length: 26\r\n\r\nContent payload number one"
|
|
"Content-Length: 26\r\n\r\nContent payload number two"
|
|
"Content-Length: 28\r\n\r\nContent payload number three");
|
|
}
|
|
|
|
TEST(ContentStreamTest, Read) {
|
|
auto sb = dap::StringBuffer::create();
|
|
sb->write("Content-Length: 26\r\n\r\nContent payload number one");
|
|
sb->write("some unrecognised garbage");
|
|
sb->write("Content-Length: 26\r\n\r\nContent payload number two");
|
|
sb->write("some more unrecognised garbage");
|
|
sb->write("Content-Length: 28\r\n\r\nContent payload number three");
|
|
dap::ContentReader cs(std::move(sb));
|
|
ASSERT_EQ(cs.read(), "Content payload number one");
|
|
ASSERT_EQ(cs.read(), "Content payload number two");
|
|
ASSERT_EQ(cs.read(), "Content payload number three");
|
|
ASSERT_EQ(cs.read(), "");
|
|
}
|
|
|
|
TEST(ContentStreamTest, ShortRead) {
|
|
auto sb = dap::StringBuffer::create();
|
|
sb->write("Content-Length: 26\r\n\r\nContent payload number one");
|
|
sb->write("some unrecognised garbage");
|
|
sb->write("Content-Length: 26\r\n\r\nContent payload number two");
|
|
sb->write("some more unrecognised garbage");
|
|
sb->write("Content-Length: 28\r\n\r\nContent payload number three");
|
|
dap::ContentReader cs(
|
|
std::unique_ptr<SingleByteReader>(new SingleByteReader(std::move(sb))));
|
|
ASSERT_EQ(cs.read(), "Content payload number one");
|
|
ASSERT_EQ(cs.read(), "Content payload number two");
|
|
ASSERT_EQ(cs.read(), "Content payload number three");
|
|
ASSERT_EQ(cs.read(), "");
|
|
}
|
|
|
|
TEST(ContentStreamTest, PartialReadAndParse) {
|
|
auto sb = std::make_shared<dap::StringBuffer>();
|
|
sb->write("Content");
|
|
sb->write("-Length: ");
|
|
sb->write("26");
|
|
sb->write("\r\n\r\n");
|
|
sb->write("Content payload number one");
|
|
|
|
dap::ContentReader cs(sb);
|
|
ASSERT_EQ(cs.read(), "Content payload number one");
|
|
ASSERT_EQ(cs.read(), "");
|
|
}
|
|
|
|
TEST(ContentStreamTest, HttpRequest) {
|
|
const char* const part1 =
|
|
"POST / HTTP/1.1\r\n"
|
|
"Host: localhost:8001\r\n"
|
|
"Connection: keep-alive\r\n"
|
|
"Content-Length: 99\r\n";
|
|
const char* const part2 =
|
|
"Pragma: no-cache\r\n"
|
|
"Cache-Control: no-cache\r\n"
|
|
"Content-Type: text/plain;charset=UTF-8\r\n"
|
|
"Accept: */*\r\n"
|
|
"Origin: null\r\n"
|
|
"Sec-Fetch-Site: cross-site\r\n"
|
|
"Sec-Fetch-Mode: cors\r\n"
|
|
"Sec-Fetch-Dest: empty\r\n"
|
|
"Accept-Encoding: gzip, deflate, br\r\n"
|
|
"Accept-Language: en-US,en;q=0.9\r\n"
|
|
"\r\n"
|
|
"{\"type\":\"request\",\"command\":\"launch\",\"arguments\":{\"cmd\":\"/"
|
|
"bin/sh -c 'echo remote code execution'\"}}";
|
|
|
|
auto sb = dap::StringBuffer::create();
|
|
sb->write(part1);
|
|
sb->write(part2);
|
|
|
|
dap::ContentReader cr(std::move(sb), dap::kClose);
|
|
ASSERT_EQ(cr.read(), "");
|
|
ASSERT_FALSE(cr.isOpen());
|
|
}
|