diff options
author | Stefan Fritsch <sf@apache.org> | 2010-10-24 10:17:26 +0200 |
---|---|---|
committer | Stefan Fritsch <sf@apache.org> | 2010-10-24 10:17:26 +0200 |
commit | 25ef3c1325f8f13ac5c9a4a85f94157af56fdacd (patch) | |
tree | 890b77a51d49dedcfcd95bb774f03ace5b7f1286 /modules/dav/main | |
parent | Improve error message if client cert verification fails (diff) | |
download | apache2-25ef3c1325f8f13ac5c9a4a85f94157af56fdacd.tar.xz apache2-25ef3c1325f8f13ac5c9a4a85f94157af56fdacd.zip |
If a malformed Content-Range header is received for a PUT request, we
must not use the supplied content per RFC 2616 14.16. Send 400 response
instead of ignoring the Content-Range.
PR: 49825
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1026743 13f79535-47bb-0310-9956-ffa450edef68
Diffstat (limited to 'modules/dav/main')
-rw-r--r-- | modules/dav/main/mod_dav.c | 42 |
1 files changed, 27 insertions, 15 deletions
diff --git a/modules/dav/main/mod_dav.c b/modules/dav/main/mod_dav.c index 081d724403..42d3abaa75 100644 --- a/modules/dav/main/mod_dav.c +++ b/modules/dav/main/mod_dav.c @@ -751,6 +751,11 @@ static dav_error * dav_open_lockdb(request_rec *r, int ro, dav_lockdb **lockdb) return (*hooks->open_lockdb)(r, ro, 0, lockdb); } +/** + * @return 1 if valid content-range, + * 0 if no content-range, + * -1 if malformed content-range + */ static int dav_parse_range(request_rec *r, apr_off_t *range_start, apr_off_t *range_end) { @@ -768,21 +773,20 @@ static int dav_parse_range(request_rec *r, if (strncasecmp(range, "bytes ", 6) != 0 || (dash = ap_strchr(range, '-')) == NULL || (slash = ap_strchr(range, '/')) == NULL) { - /* malformed header. ignore it (per S14.16 of RFC2616) */ - return 0; + /* malformed header */ + return -1; } *dash++ = *slash++ = '\0'; - /* ignore invalid ranges. (per S14.16 of RFC2616) */ + /* detect invalid ranges */ if (apr_strtoff(range_start, range + 6, &errp, 10) || *errp || *range_start < 0) { - return 0; + return -1; } - if (apr_strtoff(range_end, dash, &errp, 10) || *errp || *range_end < 0 || *range_end < *range_start) { - return 0; + return -1; } if (*slash != '*') { @@ -790,7 +794,7 @@ static int dav_parse_range(request_rec *r, if (apr_strtoff(&dummy, slash, &errp, 10) || *errp || dummy <= *range_end) { - return 0; + return -1; } } @@ -929,6 +933,22 @@ static int dav_method_put(request_rec *r) return dav_handle_err(r, err, multi_response); } + has_range = dav_parse_range(r, &range_start, &range_end); + if (has_range < 0) { + /* RFC 2616 14.16: If we receive an invalid Content-Range we must + * not use the content. + */ + body = apr_psprintf(r->pool, + "Malformed Content-Range header for PUT %s.", + ap_escape_html(r->pool, r->uri)); + return dav_error_response(r, HTTP_BAD_REQUEST, body); + } else if (has_range) { + mode = DAV_MODE_WRITE_SEEKABLE; + } + else { + mode = DAV_MODE_WRITE_TRUNC; + } + /* make sure the resource can be modified (if versioning repository) */ if ((err = dav_auto_checkout(r, resource, 0 /* not parent_only */, @@ -937,14 +957,6 @@ static int dav_method_put(request_rec *r) return dav_handle_err(r, err, NULL); } - /* truncate and rewrite the file unless we see a Content-Range */ - mode = DAV_MODE_WRITE_TRUNC; - - has_range = dav_parse_range(r, &range_start, &range_end); - if (has_range) { - mode = DAV_MODE_WRITE_SEEKABLE; - } - /* Create the new file in the repository */ if ((err = (*resource->hooks->open_stream)(resource, mode, &stream)) != NULL) { |