Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit5cbc8c6

Browse files
gh-133889: Only show the path of the URL in the SimpleHTTPRequestHandler page (GH-134135)
The query and fragment are ambiguous and not used.
1 parentbb32f3c commit5cbc8c6

File tree

3 files changed

+15
-8
lines changed

3 files changed

+15
-8
lines changed

‎Lib/http/server.py

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -818,11 +818,14 @@ def list_directory(self, path):
818818
returnNone
819819
list.sort(key=lambdaa:a.lower())
820820
r= []
821+
displaypath=self.path
822+
displaypath=displaypath.split('#',1)[0]
823+
displaypath=displaypath.split('?',1)[0]
821824
try:
822-
displaypath=urllib.parse.unquote(self.path,
825+
displaypath=urllib.parse.unquote(displaypath,
823826
errors='surrogatepass')
824827
exceptUnicodeDecodeError:
825-
displaypath=urllib.parse.unquote(self.path)
828+
displaypath=urllib.parse.unquote(displaypath)
826829
displaypath=html.escape(displaypath,quote=False)
827830
enc=sys.getfilesystemencoding()
828831
title=f'Directory listing for{displaypath}'

‎Lib/test/test_httpservers.py

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -627,13 +627,14 @@ def test_list_dir_escape_filename(self):
627627
self.check_list_dir_filename(filename)
628628
os_helper.unlink(os.path.join(self.tempdir,filename))
629629

630-
deftest_undecodable_parameter(self):
631-
# sanity check using a valid parameter
630+
deftest_list_dir_with_query_and_fragment(self):
631+
prefix=f'listing for{self.base_url}/</'.encode('latin1')
632+
response=self.request(self.base_url+'/#123').read()
633+
self.assertIn(prefix+b'title>',response)
634+
self.assertIn(prefix+b'h1>',response)
632635
response=self.request(self.base_url+'/?x=123').read()
633-
self.assertRegex(response,rf'listing for{self.base_url}/\?x=123'.encode('latin1'))
634-
# now the bogus encoding
635-
response=self.request(self.base_url+'/?x=%bb').read()
636-
self.assertRegex(response,rf'listing for{self.base_url}/\?x=\xef\xbf\xbd'.encode('latin1'))
636+
self.assertIn(prefix+b'title>',response)
637+
self.assertIn(prefix+b'h1>',response)
637638

638639
deftest_get_dir_redirect_location_domain_injection_bug(self):
639640
"""Ensure //evil.co/..%2f../../X does not put //evil.co/ in Location.
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
The generated directory listing page in
2+
:class:`http.server.SimpleHTTPRequestHandler` now only shows the decoded
3+
path component of the requested URL, and not the query and fragment.

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp