mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2024-12-04 05:20:30 +00:00
LibWeb+LibWebView: Set the default path for invalid cookie Path values
Some checks are pending
CI / Lagom (false, FUZZ, ubuntu-22.04, Linux, Clang) (push) Waiting to run
CI / Lagom (false, NO_FUZZ, macos-14, macOS, Clang) (push) Waiting to run
CI / Lagom (false, NO_FUZZ, ubuntu-22.04, Linux, GNU) (push) Waiting to run
CI / Lagom (true, NO_FUZZ, ubuntu-22.04, Linux, Clang) (push) Waiting to run
Package the js repl as a binary artifact / build-and-package (macos-14, macOS, macOS-universal2) (push) Waiting to run
Package the js repl as a binary artifact / build-and-package (ubuntu-22.04, Linux, Linux-x86_64) (push) Waiting to run
Run test262 and test-wasm / run_and_update_results (push) Waiting to run
Lint Code / lint (push) Waiting to run
Push notes / build (push) Waiting to run
Some checks are pending
CI / Lagom (false, FUZZ, ubuntu-22.04, Linux, Clang) (push) Waiting to run
CI / Lagom (false, NO_FUZZ, macos-14, macOS, Clang) (push) Waiting to run
CI / Lagom (false, NO_FUZZ, ubuntu-22.04, Linux, GNU) (push) Waiting to run
CI / Lagom (true, NO_FUZZ, ubuntu-22.04, Linux, Clang) (push) Waiting to run
Package the js repl as a binary artifact / build-and-package (macos-14, macOS, macOS-universal2) (push) Waiting to run
Package the js repl as a binary artifact / build-and-package (ubuntu-22.04, Linux, Linux-x86_64) (push) Waiting to run
Run test262 and test-wasm / run_and_update_results (push) Waiting to run
Lint Code / lint (push) Waiting to run
Push notes / build (push) Waiting to run
We were missing this spec step when parsing the Path attribute.
This commit is contained in:
parent
ba1189cd1c
commit
e74d2b1762
Notes:
github-actions[bot]
2024-09-18 23:02:58 +00:00
Author: https://github.com/trflynn89 Commit: https://github.com/LadybirdBrowser/ladybird/commit/e74d2b17620 Pull-request: https://github.com/LadybirdBrowser/ladybird/pull/1434 Reviewed-by: https://github.com/tcl3 ✅
8 changed files with 64 additions and 47 deletions
|
@ -5,6 +5,7 @@ Valueless cookie: "cookie="
|
|||
Nameless and valueless cookie: ""
|
||||
Invalid control character: ""
|
||||
Non-ASCII domain: ""
|
||||
Default path: "cookie1=value; cookie2=value"
|
||||
Secure cookie prefix: ""
|
||||
Host cookie prefix: ""
|
||||
Large value: "cookie=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
|
||||
|
|
|
@ -60,6 +60,16 @@
|
|||
printCookies("Non-ASCII domain");
|
||||
};
|
||||
|
||||
const defaultPathTest = () => {
|
||||
document.cookie = "cookie1=value; path=";
|
||||
document.cookie = "cookie2=value; path=f";
|
||||
|
||||
printCookies("Default path");
|
||||
|
||||
deleteCookie("cookie1");
|
||||
deleteCookie("cookie2");
|
||||
};
|
||||
|
||||
const secureCookiePrefixTest = () => {
|
||||
document.cookie = "__Secure-cookie=value";
|
||||
printCookies("Secure cookie prefix");
|
||||
|
@ -179,6 +189,7 @@
|
|||
|
||||
invalidControlCharacterTest();
|
||||
nonASCIIDomainTest();
|
||||
defaultPathTest();
|
||||
secureCookiePrefixTest();
|
||||
hostCookiePrefixTest();
|
||||
|
||||
|
|
|
@ -12,17 +12,18 @@
|
|||
#include <AK/Vector.h>
|
||||
#include <LibIPC/Decoder.h>
|
||||
#include <LibIPC/Encoder.h>
|
||||
#include <LibURL/URL.h>
|
||||
#include <LibWeb/Infra/Strings.h>
|
||||
#include <ctype.h>
|
||||
|
||||
namespace Web::Cookie {
|
||||
|
||||
static void parse_attributes(ParsedCookie& parsed_cookie, StringView unparsed_attributes);
|
||||
static void process_attribute(ParsedCookie& parsed_cookie, StringView attribute_name, StringView attribute_value);
|
||||
static void parse_attributes(URL::URL const&, ParsedCookie& parsed_cookie, StringView unparsed_attributes);
|
||||
static void process_attribute(URL::URL const&, ParsedCookie& parsed_cookie, StringView attribute_name, StringView attribute_value);
|
||||
static void on_expires_attribute(ParsedCookie& parsed_cookie, StringView attribute_value);
|
||||
static void on_max_age_attribute(ParsedCookie& parsed_cookie, StringView attribute_value);
|
||||
static void on_domain_attribute(ParsedCookie& parsed_cookie, StringView attribute_value);
|
||||
static void on_path_attribute(ParsedCookie& parsed_cookie, StringView attribute_value);
|
||||
static void on_path_attribute(URL::URL const&, ParsedCookie& parsed_cookie, StringView attribute_value);
|
||||
static void on_secure_attribute(ParsedCookie& parsed_cookie);
|
||||
static void on_http_only_attribute(ParsedCookie& parsed_cookie);
|
||||
static void on_same_site_attribute(ParsedCookie& parsed_cookie, StringView attribute_value);
|
||||
|
@ -43,7 +44,7 @@ bool cookie_contains_invalid_control_character(StringView cookie_string)
|
|||
}
|
||||
|
||||
// https://www.ietf.org/archive/id/draft-ietf-httpbis-rfc6265bis-15.html#section-5.6-6
|
||||
Optional<ParsedCookie> parse_cookie(StringView cookie_string)
|
||||
Optional<ParsedCookie> parse_cookie(URL::URL const& url, StringView cookie_string)
|
||||
{
|
||||
// 1. If the set-cookie-string contains a %x00-08 / %x0A-1F / %x7F character (CTL characters excluding HTAB):
|
||||
// Abort these steps and ignore the set-cookie-string entirely.
|
||||
|
@ -96,12 +97,12 @@ Optional<ParsedCookie> parse_cookie(StringView cookie_string)
|
|||
// 6. The cookie-name is the name string, and the cookie-value is the value string.
|
||||
ParsedCookie parsed_cookie { MUST(String::from_utf8(name)), MUST(String::from_utf8(value)) };
|
||||
|
||||
parse_attributes(parsed_cookie, unparsed_attributes);
|
||||
parse_attributes(url, parsed_cookie, unparsed_attributes);
|
||||
return parsed_cookie;
|
||||
}
|
||||
|
||||
// https://www.ietf.org/archive/id/draft-ietf-httpbis-rfc6265bis-15.html#section-5.6-8
|
||||
void parse_attributes(ParsedCookie& parsed_cookie, StringView unparsed_attributes)
|
||||
void parse_attributes(URL::URL const& url, ParsedCookie& parsed_cookie, StringView unparsed_attributes)
|
||||
{
|
||||
// 1. If the unparsed-attributes string is empty, skip the rest of these steps.
|
||||
if (unparsed_attributes.is_empty())
|
||||
|
@ -152,19 +153,19 @@ void parse_attributes(ParsedCookie& parsed_cookie, StringView unparsed_attribute
|
|||
// 6. If the attribute-value is longer than 1024 octets, ignore the cookie-av string and return to Step 1 of this
|
||||
// algorithm.
|
||||
if (attribute_value.length() > 1024) {
|
||||
parse_attributes(parsed_cookie, unparsed_attributes);
|
||||
parse_attributes(url, parsed_cookie, unparsed_attributes);
|
||||
return;
|
||||
}
|
||||
|
||||
// 7. Process the attribute-name and attribute-value according to the requirements in the following subsections.
|
||||
// (Notice that attributes with unrecognized attribute-names are ignored.)
|
||||
process_attribute(parsed_cookie, attribute_name, attribute_value);
|
||||
process_attribute(url, parsed_cookie, attribute_name, attribute_value);
|
||||
|
||||
// 8. Return to Step 1 of this algorithm.
|
||||
parse_attributes(parsed_cookie, unparsed_attributes);
|
||||
parse_attributes(url, parsed_cookie, unparsed_attributes);
|
||||
}
|
||||
|
||||
void process_attribute(ParsedCookie& parsed_cookie, StringView attribute_name, StringView attribute_value)
|
||||
void process_attribute(URL::URL const& url, ParsedCookie& parsed_cookie, StringView attribute_name, StringView attribute_value)
|
||||
{
|
||||
if (attribute_name.equals_ignoring_ascii_case("Expires"sv)) {
|
||||
on_expires_attribute(parsed_cookie, attribute_value);
|
||||
|
@ -173,7 +174,7 @@ void process_attribute(ParsedCookie& parsed_cookie, StringView attribute_name, S
|
|||
} else if (attribute_name.equals_ignoring_ascii_case("Domain"sv)) {
|
||||
on_domain_attribute(parsed_cookie, attribute_value);
|
||||
} else if (attribute_name.equals_ignoring_ascii_case("Path"sv)) {
|
||||
on_path_attribute(parsed_cookie, attribute_value);
|
||||
on_path_attribute(url, parsed_cookie, attribute_value);
|
||||
} else if (attribute_name.equals_ignoring_ascii_case("Secure"sv)) {
|
||||
on_secure_attribute(parsed_cookie);
|
||||
} else if (attribute_name.equals_ignoring_ascii_case("HttpOnly"sv)) {
|
||||
|
@ -278,21 +279,24 @@ void on_domain_attribute(ParsedCookie& parsed_cookie, StringView attribute_value
|
|||
}
|
||||
|
||||
// https://www.ietf.org/archive/id/draft-ietf-httpbis-rfc6265bis-15.html#section-5.6.4
|
||||
void on_path_attribute(ParsedCookie& parsed_cookie, StringView attribute_value)
|
||||
void on_path_attribute(URL::URL const& url, ParsedCookie& parsed_cookie, StringView attribute_value)
|
||||
{
|
||||
String cookie_path;
|
||||
|
||||
// 1. If the attribute-value is empty or if the first character of the attribute-value is not %x2F ("/"):
|
||||
if (attribute_value.is_empty() || attribute_value[0] != '/') {
|
||||
// Let cookie-path be the default-path.
|
||||
return;
|
||||
// 1. Let cookie-path be the default-path.
|
||||
cookie_path = default_path(url);
|
||||
}
|
||||
|
||||
// Otherwise:
|
||||
// 1. Let cookie-path be the attribute-value.
|
||||
auto cookie_path = attribute_value;
|
||||
else {
|
||||
// 1. Let cookie-path be the attribute-value.
|
||||
cookie_path = MUST(String::from_utf8(attribute_value));
|
||||
}
|
||||
|
||||
// 2. Append an attribute to the cookie-attribute-list with an attribute-name of Path and an attribute-value of
|
||||
// cookie-path.
|
||||
parsed_cookie.path = MUST(String::from_utf8(cookie_path));
|
||||
parsed_cookie.path = move(cookie_path);
|
||||
}
|
||||
|
||||
// https://www.ietf.org/archive/id/draft-ietf-httpbis-rfc6265bis-15.html#section-5.6.5
|
||||
|
@ -464,6 +468,30 @@ Optional<UnixDateTime> parse_date_time(StringView date_string)
|
|||
return parsed_cookie_date;
|
||||
}
|
||||
|
||||
// https://www.ietf.org/archive/id/draft-ietf-httpbis-rfc6265bis-15.html#section-5.1.4
|
||||
String default_path(URL::URL const& url)
|
||||
{
|
||||
// 1. Let uri-path be the path portion of the request-uri if such a portion exists (and empty otherwise).
|
||||
auto uri_path = URL::percent_decode(url.serialize_path());
|
||||
|
||||
// 2. If the uri-path is empty or if the first character of the uri-path is not a %x2F ("/") character, output
|
||||
// %x2F ("/") and skip the remaining steps.
|
||||
if (uri_path.is_empty() || (uri_path[0] != '/'))
|
||||
return "/"_string;
|
||||
|
||||
StringView uri_path_view = uri_path;
|
||||
size_t last_separator = uri_path_view.find_last('/').value();
|
||||
|
||||
// 3. If the uri-path contains no more than one %x2F ("/") character, output %x2F ("/") and skip the remaining step.
|
||||
if (last_separator == 0)
|
||||
return "/"_string;
|
||||
|
||||
// 4. Output the characters of the uri-path from the first character up to, but not including, the right-most
|
||||
// %x2F ("/").
|
||||
// FIXME: The path might not be valid UTF-8.
|
||||
return MUST(String::from_utf8(uri_path.substring_view(0, last_separator)));
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
template<>
|
||||
|
|
|
@ -10,6 +10,7 @@
|
|||
#include <AK/String.h>
|
||||
#include <AK/Time.h>
|
||||
#include <LibIPC/Forward.h>
|
||||
#include <LibURL/Forward.h>
|
||||
#include <LibWeb/Cookie/Cookie.h>
|
||||
|
||||
namespace Web::Cookie {
|
||||
|
@ -26,8 +27,9 @@ struct ParsedCookie {
|
|||
bool http_only_attribute_present { false };
|
||||
};
|
||||
|
||||
Optional<ParsedCookie> parse_cookie(StringView cookie_string);
|
||||
Optional<ParsedCookie> parse_cookie(URL::URL const&, StringView cookie_string);
|
||||
bool cookie_contains_invalid_control_character(StringView);
|
||||
String default_path(URL::URL const&);
|
||||
|
||||
}
|
||||
|
||||
|
|
|
@ -2446,7 +2446,7 @@ String Document::cookie(Cookie::Source source)
|
|||
|
||||
void Document::set_cookie(StringView cookie_string, Cookie::Source source)
|
||||
{
|
||||
auto cookie = Cookie::parse_cookie(cookie_string);
|
||||
auto cookie = Cookie::parse_cookie(url(), cookie_string);
|
||||
if (!cookie.has_value())
|
||||
return;
|
||||
|
||||
|
|
|
@ -137,7 +137,7 @@ static ByteString sanitized_url_for_logging(URL::URL const& url)
|
|||
|
||||
static void store_response_cookies(Page& page, URL::URL const& url, ByteString const& set_cookie_entry)
|
||||
{
|
||||
auto cookie = Cookie::parse_cookie(set_cookie_entry);
|
||||
auto cookie = Cookie::parse_cookie(url, set_cookie_entry);
|
||||
if (!cookie.has_value())
|
||||
return;
|
||||
page.client().page_did_set_cookie(url, cookie.value(), Cookie::Source::Http); // FIXME: Determine cookie source correctly
|
||||
|
|
|
@ -276,30 +276,6 @@ bool CookieJar::path_matches(StringView request_path, StringView cookie_path)
|
|||
return false;
|
||||
}
|
||||
|
||||
// https://www.ietf.org/archive/id/draft-ietf-httpbis-rfc6265bis-15.html#section-5.1.4
|
||||
String CookieJar::default_path(const URL::URL& url)
|
||||
{
|
||||
// 1. Let uri-path be the path portion of the request-uri if such a portion exists (and empty otherwise).
|
||||
auto uri_path = URL::percent_decode(url.serialize_path());
|
||||
|
||||
// 2. If the uri-path is empty or if the first character of the uri-path is not a %x2F ("/") character, output
|
||||
// %x2F ("/") and skip the remaining steps.
|
||||
if (uri_path.is_empty() || (uri_path[0] != '/'))
|
||||
return "/"_string;
|
||||
|
||||
StringView uri_path_view = uri_path;
|
||||
size_t last_separator = uri_path_view.find_last('/').value();
|
||||
|
||||
// 3. If the uri-path contains no more than one %x2F ("/") character, output %x2F ("/") and skip the remaining step.
|
||||
if (last_separator == 0)
|
||||
return "/"_string;
|
||||
|
||||
// 4. Output the characters of the uri-path from the first character up to, but not including, the right-most
|
||||
// %x2F ("/").
|
||||
// FIXME: The path might not be valid UTF-8.
|
||||
return MUST(String::from_utf8(uri_path.substring_view(0, last_separator)));
|
||||
}
|
||||
|
||||
// https://www.ietf.org/archive/id/draft-ietf-httpbis-rfc6265bis-15.html#name-storage-model
|
||||
void CookieJar::store_cookie(Web::Cookie::ParsedCookie const& parsed_cookie, const URL::URL& url, String canonicalized_domain, Web::Cookie::Source source)
|
||||
{
|
||||
|
@ -424,7 +400,7 @@ void CookieJar::store_cookie(Web::Cookie::ParsedCookie const& parsed_cookie, con
|
|||
if (parsed_cookie.path->byte_count() <= 1024)
|
||||
cookie.path = parsed_cookie.path.value();
|
||||
} else {
|
||||
cookie.path = default_path(url);
|
||||
cookie.path = Web::Cookie::default_path(url);
|
||||
}
|
||||
|
||||
// 12. If the cookie-attribute-list contains an attribute with an attribute-name of "Secure", set the cookie's
|
||||
|
|
|
@ -104,7 +104,6 @@ private:
|
|||
static Optional<String> canonicalize_domain(const URL::URL& url);
|
||||
static bool domain_matches(StringView string, StringView domain_string);
|
||||
static bool path_matches(StringView request_path, StringView cookie_path);
|
||||
static String default_path(const URL::URL& url);
|
||||
|
||||
enum class MatchingCookiesSpecMode {
|
||||
RFC6265,
|
||||
|
|
Loading…
Reference in a new issue