Skip to content

Commit 4e9cefa

Browse files
committed
add a default limit for the amount of data xmlrpclib.gzip_decode will return (closes python#16043)
1 parent 258f3f0 commit 4e9cefa

File tree

3 files changed

+36
-3
lines changed

3 files changed

+36
-3
lines changed

Lib/test/test_xmlrpc.py

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -776,7 +776,7 @@ def test_bad_gzip_request(self):
776776
p.pow(6, 8)
777777
p("close")()
778778

779-
def test_gsip_response(self):
779+
def test_gzip_response(self):
780780
t = self.Transport()
781781
p = xmlrpclib.ServerProxy(URL, transport=t)
782782
old = self.requestHandler.encode_threshold
@@ -790,6 +790,26 @@ def test_gsip_response(self):
790790
self.requestHandler.encode_threshold = old
791791
self.assertTrue(a>b)
792792

793+
794+
class GzipUtilTestCase(unittest.TestCase):
795+
796+
def test_gzip_decode_limit(self):
797+
max_gzip_decode = 20 * 1024 * 1024
798+
data = b'\0' * max_gzip_decode
799+
encoded = xmlrpclib.gzip_encode(data)
800+
decoded = xmlrpclib.gzip_decode(encoded)
801+
self.assertEqual(len(decoded), max_gzip_decode)
802+
803+
data = b'\0' * (max_gzip_decode + 1)
804+
encoded = xmlrpclib.gzip_encode(data)
805+
806+
with self.assertRaisesRegexp(ValueError,
807+
"max gzipped payload length exceeded"):
808+
xmlrpclib.gzip_decode(encoded)
809+
810+
xmlrpclib.gzip_decode(encoded, max_decode=-1)
811+
812+
793813
#Test special attributes of the ServerProxy object
794814
class ServerProxyTestCase(unittest.TestCase):
795815
def setUp(self):
@@ -990,6 +1010,7 @@ def test_main():
9901010
try:
9911011
import gzip
9921012
xmlrpc_tests.append(GzipServerTestCase)
1013+
xmlrpc_tests.append(GzipUtilTestCase)
9931014
except ImportError:
9941015
pass #gzip not supported in this build
9951016
xmlrpc_tests.append(MultiPathServerTestCase)

Lib/xmlrpc/client.py

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@
4949
# 2003-07-12 gp Correct marshalling of Faults
5050
# 2003-10-31 mvl Add multicall support
5151
# 2004-08-20 mvl Bump minimum supported Python version to 2.1
52+
# 2014-12-02 ch/doko Add workaround for gzip bomb vulnerability
5253
#
5354
# Copyright (c) 1999-2002 by Secret Labs AB.
5455
# Copyright (c) 1999-2002 by Fredrik Lundh.
@@ -1017,10 +1018,13 @@ def gzip_encode(data):
10171018
# in the HTTP header, as described in RFC 1952
10181019
#
10191020
# @param data The encoded data
1021+
# @keyparam max_decode Maximum bytes to decode (20MB default), use negative
1022+
# values for unlimited decoding
10201023
# @return the unencoded data
10211024
# @raises ValueError if data is not correctly coded.
1025+
# @raises ValueError if max gzipped payload length exceeded
10221026

1023-
def gzip_decode(data):
1027+
def gzip_decode(data, max_decode=20971520):
10241028
"""gzip encoded data -> unencoded data
10251029
10261030
Decode data using the gzip content encoding as described in RFC 1952
@@ -1030,11 +1034,16 @@ def gzip_decode(data):
10301034
f = BytesIO(data)
10311035
gzf = gzip.GzipFile(mode="rb", fileobj=f)
10321036
try:
1033-
decoded = gzf.read()
1037+
if max_decode < 0: # no limit
1038+
decoded = gzf.read()
1039+
else:
1040+
decoded = gzf.read(max_decode + 1)
10341041
except IOError:
10351042
raise ValueError("invalid data")
10361043
f.close()
10371044
gzf.close()
1045+
if max_decode >= 0 and len(decoded) > max_decode:
1046+
raise ValueError("max gzipped payload length exceeded")
10381047
return decoded
10391048

10401049
##

Misc/NEWS

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,9 @@ Core and Builtins
1616
Library
1717
-------
1818

19+
- Issue #16043: Add a default limit for the amount of data xmlrpclib.gzip_decode
20+
will return. This resolves CVE-2013-1753.
21+
1922
- Issue #16040: CVE-2013-1752: nntplib: Limit maximum line lengths to 2048 to
2023
prevent readline() calls from consuming too much memory. Patch by Jyrki
2124
Pulliainen.

0 commit comments

Comments
 (0)