node/test/parallel/test-http-transfer-encoding-smuggling.js
Matteo Collina 029703100f
http: add test for http transfer encoding smuggling
CVE-ID: CVE-2020-8287
Refs: https://github.com/nodejs-private/llhttp-private/pull/3
Refs: https://hackerone.com/bugs?report_id=1002188&subject=nodejs
PR-URL: https://github.com/nodejs-private/node-private/pull/228
Reviewed-By: Fedor Indutny <fedor.indutny@gmail.com>
Reviewed-By: Rich Trott <rtrott@gmail.com>
2021-01-04 16:56:30 +00:00

45 lines
872 B
JavaScript

'use strict';
const common = require('../common');
const http = require('http');
const net = require('net');
const msg = [
'POST / HTTP/1.1',
'Host: 127.0.0.1',
'Transfer-Encoding: chunked',
'Transfer-Encoding: chunked-false',
'Connection: upgrade',
'',
'1',
'A',
'0',
'',
'GET /flag HTTP/1.1',
'Host: 127.0.0.1',
'',
'',
].join('\r\n');
// Verify that the server is called only once even with a smuggled request.
const server = http.createServer(common.mustCall((req, res) => {
res.end();
}, 1));
function send(next) {
const client = net.connect(server.address().port, 'localhost');
client.setEncoding('utf8');
client.on('error', common.mustNotCall());
client.on('end', next);
client.write(msg);
client.resume();
}
server.listen(0, common.mustSucceed(() => {
send(common.mustCall(() => {
server.close();
}));
}));