Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Be exhaustive in invalid character for header name #4314

Merged
merged 1 commit into from Apr 13, 2022

Conversation

vietj
Copy link
Member

@vietj vietj commented Mar 16, 2022

According to :

https://datatracker.ietf.org/doc/html/rfc7230#section-3.2
https://datatracker.ietf.org/doc/html/rfc5234#appendix-B.1
https://datatracker.ietf.org/doc/html/rfc7540#section-10.3
For both HTTP/1.1 and HTTP/2.0 versions, bytes allowed for header value are : CR (0x0D), LF (0x0A), SP (0x20), HTAB (0x09) and ranges 0x21 to 0x7E and 0x80 to 0xFF (although the last range is considered as obsolete)

For more information, see the related issue : #4255

@vietj vietj added the bug label Mar 16, 2022
@vietj vietj modified the milestones: 4.2.6, 4.2.7 Mar 16, 2022
@vietj vietj force-pushed the backport_strict_http_header_value_verifier branch from 7433e5f to ac6434a Compare April 13, 2022 08:29
Signed-off-by: Nils Renaud <renaud.nils@gmail.com>
@vietj vietj force-pushed the backport_strict_http_header_value_verifier branch from ac6434a to f8657c4 Compare April 13, 2022 09:39
@vietj vietj merged commit 20d0aa7 into 4.2 Apr 13, 2022
@vietj vietj deleted the backport_strict_http_header_value_verifier branch April 13, 2022 11:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants