mirror of
https://github.com/apache/httpd.git
synced 2025-08-07 04:02:58 +03:00
http: Enforce that fully qualified uri-paths not to be forward-proxied
have an http(s) scheme, and that the ones to be forward proxied have a hostname, per HTTP specifications. The early checks avoid failing the request later on and thus save cycles for those invalid cases. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1895921 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
@@ -781,13 +781,13 @@ static int proxy_detect(request_rec *r)
|
||||
|
||||
/* Ick... msvc (perhaps others) promotes ternary short results to int */
|
||||
|
||||
if (conf->req && r->parsed_uri.scheme) {
|
||||
if (conf->req && r->parsed_uri.scheme && r->parsed_uri.hostname) {
|
||||
/* but it might be something vhosted */
|
||||
if (!(r->parsed_uri.hostname
|
||||
&& !ap_cstr_casecmp(r->parsed_uri.scheme, ap_http_scheme(r))
|
||||
&& ap_matches_request_vhost(r, r->parsed_uri.hostname,
|
||||
(apr_port_t)(r->parsed_uri.port_str ? r->parsed_uri.port
|
||||
: ap_default_port(r))))) {
|
||||
if (ap_cstr_casecmp(r->parsed_uri.scheme, ap_http_scheme(r)) != 0
|
||||
|| !ap_matches_request_vhost(r, r->parsed_uri.hostname,
|
||||
(apr_port_t)(r->parsed_uri.port_str
|
||||
? r->parsed_uri.port
|
||||
: ap_default_port(r)))) {
|
||||
r->proxyreq = PROXYREQ_PROXY;
|
||||
r->uri = r->unparsed_uri;
|
||||
r->filename = apr_pstrcat(r->pool, "proxy:", r->uri, NULL);
|
||||
|
Reference in New Issue
Block a user