summaryrefslogtreecommitdiffstats
path: root/debian/perl-framework/t/security/CVE-2009-1890.t
blob: 6ef46b2d121bef16f07d846818f3f9877240e972 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
use strict;
use warnings FATAL => 'all';

use Apache::Test;
use Apache::TestRequest;
use Apache::TestUtil;

use IO::Select;

plan tests => 7, need [qw(mod_proxy proxy_http.c)];

my $len = 100000;

my $sock = Apache::TestRequest::vhost_socket('proxy_http_reverse');
ok $sock && $sock->connected;

my $req = 
    "POST /reverse/modules/cgi/perl_echo.pl HTTP/1.0\r\n".
    "Content-Length: 0" . $len . "\r\n".
    "\r\n";

ok $sock->print($req);

my $half_body = 'x' x ($len/2);
ok $sock->print($half_body);
sleep(1);
ok $sock->print($half_body);

my $readable = IO::Select->new($sock)->can_read(10);
ok $readable, 1, "timeout, server hung";
if (!$readable) {
    skip "server hung, not testing further", foreach(1..2);
    exit(0);
}

my $line = Apache::TestRequest::getline($sock) || '';
ok t_cmp($line, qr{^HTTP/1\.. 200}, "request was parsed");

do {
    $line = Apache::TestRequest::getline($sock) || '';
    $line = super_chomp($line);
    print "# header: $line\n";
} until ($line eq "");

my $buffer;
while ($len > 0 && $sock->read($buffer, $len)) {
    print "# got: $buffer\n";
    $len -= length($buffer);
    print "# remaining: $len\n";
}

ok t_cmp($len, 0, "read entire body");

sub super_chomp {
    my ($body) = shift;

    ## super chomp - all leading and trailing \n (and \r for win32)
    $body =~ s/^[\n\r]*//;
    $body =~ s/[\n\r]*$//;
    ## and all the rest change to spaces
    $body =~ s/\n/ /g;
    $body =~ s/\r//g; #rip out all remaining \r's

    $body;
}