Closed GoogleCodeExporter closed 9 years ago
I pushed http://code.google.com/p/mongoose/source/detail?r=1235f90153 which at
least avoids the crash.
I don't have enough perl skills to add a test for this. Once there's a test,
I'm willing to work on a fix.
Original comment by arnout.v...@gmail.com
on 2 Dec 2010 at 4:57
Thanks Arnout.
Test could be done this way:
# Create an entry in a passwords file
mongoose -A test/passfile "mydomain.com" "user with space, and comma" "pass"
# Generate valid authorization header for that entry. Yes, this is a replay
attack scenario
mongoose -g test/passfile
# Run browser on port 8080, enter "user with space, and comma", "pass"
credentials
# Then either see request in a firebug or other debugger, or stop mongoose, run
netcat and see request on a terminal
nc -l 8080
Copy/paste valid auth header in test/test.pl for PUT request.
Original comment by valenok
on 3 Dec 2010 at 8:17
That just happens to work because currently the nonce isn't checked by
mongoose...
Anyway, I've added this test and fixed it in
http://code.google.com/p/mongoose/source/detail?r=6287415518
There's a serious rewrite of the skip() function, you may want to do some
review.
Original comment by arnout.v...@gmail.com
on 3 Dec 2010 at 11:50
Original issue reported on code.google.com by
steven.k...@gmail.com
on 2 Dec 2010 at 1:52