Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: HTTP response with invalid headers doesn't throw error #28865 #29420

Merged
merged 7 commits into from
Jun 11, 2024
Merged
Show file tree
Hide file tree
Changes from 5 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 8 additions & 0 deletions cli/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,12 @@
<!-- See the ../guides/writing-the-cypress-changelog.md for details on writing the changelog. -->
## 13.11.1

AtofStryker marked this conversation as resolved.
Show resolved Hide resolved
_Release 6/20/2024 (PENDING)_

**Bugfixes:

- Fixed an issue where receiving HTTP responses with invalid headers raised an error. Now cypress removes the invalid headers and gives a warning in the console with debug mode on. Fixes [#28865](https://github.com/cypress-io/cypress/issues/28865).

## 13.11.0

_Released 6/4/2024_
Expand Down

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

20 changes: 20 additions & 0 deletions packages/errors/src/errors.ts
Original file line number Diff line number Diff line change
Expand Up @@ -1808,6 +1808,26 @@ export const AllCypressErrors = {
If you're experiencing problems, downgrade dependencies and restart Cypress.
`
},

PROXY_ENCOUNTERED_INVALID_HEADER_NAME: (header: any, method: string, url: string, error: Error) => {
return errTemplate`
Warning: While proxying a ${fmt.highlight(method)} request to ${fmt.url(url)}, an HTTP header did not pass validation, and was removed. This header will not be present in the response received by the application under test.

Invalid header name: ${fmt.code(JSON.stringify(header, undefined, 2))}

${fmt.highlightSecondary(error)}
`
},

PROXY_ENCOUNTERED_INVALID_HEADER_VALUE: (header: any, method: string, url: string, error: Error) => {
return errTemplate`
Warning: While proxying a ${fmt.highlight(method)} request to ${fmt.url(url)}, an HTTP header value did not pass validation, and was removed. This header will not be present in the response received by the application under test.

Invalid header value: ${fmt.code(JSON.stringify(header, undefined, 2))}

${fmt.highlightSecondary(error)}
`
},
} as const

// eslint-disable-next-line @typescript-eslint/no-unused-vars
Expand Down
16 changes: 16 additions & 0 deletions packages/errors/test/unit/visualSnapshotErrors_spec.ts
Original file line number Diff line number Diff line change
Expand Up @@ -1376,5 +1376,21 @@ describe('visual error templates', () => {
default: [],
}
},

PROXY_ENCOUNTERED_INVALID_HEADER_NAME: () => {
const err = makeErr()

return {
default: [{ invalidHeaderName: 'Value' }, 'GET', 'http://localhost:8080', err],
}
},

PROXY_ENCOUNTERED_INVALID_HEADER_VALUE: () => {
const err = makeErr()

return {
default: [{ invalidHeaderValue: 'Value' }, 'GET', 'http://localhost:8080', err],
}
},
})
})
39 changes: 38 additions & 1 deletion packages/proxy/lib/http/response-middleware.ts
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,8 @@ import type { IncomingMessage, IncomingHttpHeaders } from 'http'

import { cspHeaderNames, generateCspDirectives, nonceDirectives, parseCspHeaders, problematicCspDirectives, unsupportedCSPDirectives } from './util/csp-header'
import { injectIntoServiceWorker } from './util/service-worker-injector'
import { validateHeaderName, validateHeaderValue } from 'http'
import error from '@packages/errors'

export interface ResponseMiddlewareProps {
/**
Expand Down Expand Up @@ -306,7 +308,42 @@ const OmitProblematicHeaders: ResponseMiddleware = function () {
'connection',
])

this.res.set(headers)
this.debug('The headers are %o', headers)

// Filter for invalid headers
const filteredHeaders = Object.fromEntries(
Object.entries(headers).filter(([key, value]) => {
try {
validateHeaderName(key)
if (Array.isArray(value)) {
value.forEach((v) => validateHeaderValue(key, v))
} else if (value !== undefined) {
validateHeaderValue(key, value)
} else {
error.warning('PROXY_ENCOUNTERED_INVALID_HEADER_VALUE', { [key]: value }, this.req.method, this.req.originalUrl, new TypeError('Header value is undefined while expecting string'))

return false
}

return true
} catch (err) {
if (err.code === 'ERR_INVALID_HTTP_TOKEN') {
error.warning('PROXY_ENCOUNTERED_INVALID_HEADER_NAME', { [key]: value }, this.req.method, this.req.originalUrl, err)
} else if (err.code === 'ERR_INVALID_CHAR') {
error.warning('PROXY_ENCOUNTERED_INVALID_HEADER_VALUE', { [key]: value }, this.req.method, this.req.originalUrl, err)
} else {
// rethrow any other errors
throw err
}

return false
}
}),
)

this.res.set(filteredHeaders)

this.debug('the new response headers are %o', this.res.getHeaderNames())

span?.setAttributes({
experimentalCspAllowList: this.config.experimentalCspAllowList,
Expand Down
36 changes: 36 additions & 0 deletions packages/proxy/test/unit/http/response-middleware.spec.ts
Original file line number Diff line number Diff line change
Expand Up @@ -275,6 +275,41 @@ describe('http/response-middleware', function () {
})
})

let badHeaders = {
'bad-header ': 'value', //(contains trailling space)
'Content Type': 'value', //(contains a space)
'User-Agent:': 'value', //(contains a colon)
'Accept-Encoding;': 'value', //(contains a semicolon)
'@Origin': 'value', //(contains an at symbol)
'Authorization?': 'value', //(contains a question mark)
'X-My-Header/Version': 'value', //(contains a slash)
'Referer[1]': 'value', //(contains square brackets)
'If-None-Match{1}': 'value', //(contains curly braces)
'X-Forwarded-For<1>': 'value', //(contains angle brackets)
}

it('removes invalid headers and leaves valid headers', function () {
prepareContext({ ...badHeaders, 'good-header': 'value' })

return testMiddleware([OmitProblematicHeaders], ctx)
.then(() => {
expect(ctx.res.set).to.have.been.calledOnce
expect(ctx.res.set).to.be.calledWith(sinon.match(function (actual) {
// Check if the invalid headers are removed
for (let header in actual) {
if (header in badHeaders) {
throw new Error(`Unexpected header "${header}"`)
}
}

// Check if the valid header is present
expect(actual['good-header']).to.equal('value')

return true
}))
})
})

const validCspHeaderNames = [
'content-security-policy',
'Content-Security-Policy',
Expand Down Expand Up @@ -444,6 +479,7 @@ describe('http/response-middleware', function () {
setHeader: sinon.stub(),
on: (event, listener) => {},
off: (event, listener) => {},
getHeaderNames: () => Object.keys(ctx.incomingRes.headers),
},
}
}
Expand Down
Loading