Skip to content

Commit

Permalink
Added missed poisoned host header test material
Browse files Browse the repository at this point in the history
  • Loading branch information
ptone committed Oct 18, 2012
1 parent 25d23d9 commit 6383d23
Showing 1 changed file with 67 additions and 0 deletions.
67 changes: 67 additions & 0 deletions tests/regressiontests/requests/tests.py
Expand Up @@ -4,6 +4,7 @@

from django.conf import settings
from django.core.handlers.modpython import ModPythonRequest
from django.core.exceptions import SuspiciousOperation
from django.core.handlers.wsgi import WSGIRequest, LimitedStream
from django.http import HttpRequest, HttpResponse, parse_cookie
from django.utils import unittest
Expand Down Expand Up @@ -101,6 +102,39 @@ def test_http_get_host(self):
}
self.assertEqual(request.get_host(), 'internal.com:8042')

# Poisoned host headers are rejected as suspicious
legit_hosts = [
'example.com',
'example.com:80',
'12.34.56.78',
'12.34.56.78:443',
'[2001:19f0:feee::dead:beef:cafe]',
'[2001:19f0:feee::dead:beef:cafe]:8080',
]

poisoned_hosts = [
'example.com@evil.tld',
'example.com:dr.frankenstein@evil.tld',
'example.com:someone@somestie.com:80',
'example.com:80/badpath'
]

for host in legit_hosts:
request = HttpRequest()
request.META = {
'HTTP_HOST': host,
}
request.get_host()

for host in poisoned_hosts:
def test_host_poisoning():
request = HttpRequest()
request.META = {
'HTTP_HOST': host,
}
request.get_host()
self.assertRaises(SuspiciousOperation, test_host_poisoning)

finally:
settings.USE_X_FORWARDED_HOST = old_USE_X_FORWARDED_HOST

Expand Down Expand Up @@ -145,6 +179,39 @@ def test_http_get_host_with_x_forwarded_host(self):
}
self.assertEqual(request.get_host(), 'internal.com:8042')

# Poisoned host headers are rejected as suspicious
legit_hosts = [
'example.com',
'example.com:80',
'12.34.56.78',
'12.34.56.78:443',
'[2001:19f0:feee::dead:beef:cafe]',
'[2001:19f0:feee::dead:beef:cafe]:8080',
]

poisoned_hosts = [
'example.com@evil.tld',
'example.com:dr.frankenstein@evil.tld',
'example.com:dr.frankenstein@evil.tld:80',
'example.com:80/badpath'
]

for host in legit_hosts:
request = HttpRequest()
request.META = {
'HTTP_HOST': host,
}
request.get_host()

for host in poisoned_hosts:
def test_host_poisoning():
request = HttpRequest()
request.META = {
'HTTP_HOST': host,
}
request.get_host()
self.assertRaises(SuspiciousOperation, test_host_poisoning)

finally:
settings.USE_X_FORWARDED_HOST = old_USE_X_FORWARDED_HOST

Expand Down

0 comments on commit 6383d23

Please sign in to comment.