Skip to content
This repository was archived by the owner on Mar 17, 2024. It is now read-only.

Better server validation#259

Merged
MaxXor merged 4 commits intoquasar:masterfrom
yankejustin:ClientInputSafety
Jun 3, 2015
Merged

Better server validation#259
MaxXor merged 4 commits intoquasar:masterfrom
yankejustin:ClientInputSafety

Conversation

@yankejustin
Copy link
Copy Markdown
Contributor

Reason

A client should never have the ability to break the server (cause an uncaught exception) by sending packets with invalid or otherwise unusable data.

Changes

- Added more restrictive validation to ensure usable information by the received packets on the handlers before use. This makes sure that a client that may make a strange request with bad data without causing a server crash.

Added more restrictive validation for the "System" handlers.
Added more restrictive validation for the "Surveillance" handlers.
Added more restrictive validation for the "Misc" Handlers.
If the packet's "Filename" property is null or empty, we can avoid
making an unnecessary string for the downloadPath by placing the
validation above it.
MaxXor added a commit that referenced this pull request Jun 3, 2015
@MaxXor MaxXor merged commit 9085cd6 into quasar:master Jun 3, 2015
@yankejustin yankejustin deleted the ClientInputSafety branch June 3, 2015 20:05
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants