1
0
Fork 0
mirror of https://github.com/ruby/ruby.git synced 2022-11-09 12:17:21 -05:00
ruby--ruby/spec/ruby/security/cve_2017_17742_spec.rb
eregon 67078e81f5 Update to ruby/spec@4bc7a2b
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@63652 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
2018-06-13 21:41:45 +00:00

34 lines
1,001 B
Ruby

require_relative '../spec_helper'
require "webrick"
require "stringio"
require "net/http"
describe "WEBrick" do
describe "resists CVE-2017-17742" do
it "for a response splitting headers" do
config = WEBrick::Config::HTTP
res = WEBrick::HTTPResponse.new config
res['X-header'] = "malicious\r\nCookie: hack"
io = StringIO.new
res.send_response io
io.rewind
res = Net::HTTPResponse.read_new(Net::BufferedIO.new(io))
res.code.should == '500'
io.string.should_not =~ /hack/
end
it "for a response splitting cookie headers" do
user_input = "malicious\r\nCookie: hack"
config = WEBrick::Config::HTTP
res = WEBrick::HTTPResponse.new config
res.cookies << WEBrick::Cookie.new('author', user_input)
io = StringIO.new
res.send_response io
io.rewind
res = Net::HTTPResponse.read_new(Net::BufferedIO.new(io))
res.code.should == '500'
io.string.should_not =~ /hack/
end
end
end