mirror of
https://github.com/nodejs/node.git
synced 2025-05-06 07:40:16 +00:00

CVE-ID: CVE-2020-8287 Refs: https://github.com/nodejs-private/llhttp-private/pull/3 Refs: https://hackerone.com/bugs?report_id=1002188&subject=nodejs PR-URL: https://github.com/nodejs-private/node-private/pull/228 Reviewed-By: Fedor Indutny <fedor.indutny@gmail.com> Reviewed-By: Rich Trott <rtrott@gmail.com>
45 lines
872 B
JavaScript
45 lines
872 B
JavaScript
'use strict';
|
|
|
|
const common = require('../common');
|
|
|
|
const http = require('http');
|
|
const net = require('net');
|
|
|
|
const msg = [
|
|
'POST / HTTP/1.1',
|
|
'Host: 127.0.0.1',
|
|
'Transfer-Encoding: chunked',
|
|
'Transfer-Encoding: chunked-false',
|
|
'Connection: upgrade',
|
|
'',
|
|
'1',
|
|
'A',
|
|
'0',
|
|
'',
|
|
'GET /flag HTTP/1.1',
|
|
'Host: 127.0.0.1',
|
|
'',
|
|
'',
|
|
].join('\r\n');
|
|
|
|
// Verify that the server is called only once even with a smuggled request.
|
|
|
|
const server = http.createServer(common.mustCall((req, res) => {
|
|
res.end();
|
|
}, 1));
|
|
|
|
function send(next) {
|
|
const client = net.connect(server.address().port, 'localhost');
|
|
client.setEncoding('utf8');
|
|
client.on('error', common.mustNotCall());
|
|
client.on('end', next);
|
|
client.write(msg);
|
|
client.resume();
|
|
}
|
|
|
|
server.listen(0, common.mustSucceed(() => {
|
|
send(common.mustCall(() => {
|
|
server.close();
|
|
}));
|
|
}));
|