From: Daniel Stenberg Date: Thu, 23 Nov 2023 07:15:47 +0000 (+0100) Subject: [PATCH] cookie: lowercase the domain names before PSL checks X-Git-Tag: archive/raspbian/7.88.1-10+rpi1+deb12u5^2~4 X-Git-Url: https://dgit.raspbian.org/?a=commitdiff_plain;h=5b2d519902a0155db70c9412e9b66dde07133516;p=curl.git [PATCH] cookie: lowercase the domain names before PSL checks Reported-by: Harry Sintonen Closes #12387 Backported by: Samuel Henrique : * Update signature of function "bad_domain" Gbp-Pq: Name CVE-2023-46218.patch --- diff --git a/lib/cookie.c b/lib/cookie.c index 7f20bf6f..c825a6bb 100644 --- a/lib/cookie.c +++ b/lib/cookie.c @@ -1044,15 +1044,23 @@ Curl_cookie_add(struct Curl_easy *data, * dereference it. */ if(data && (domain && co->domain && !Curl_host_is_ipnum(co->domain))) { - const psl_ctx_t *psl = Curl_psl_use(data); - int acceptable; - - if(psl) { - acceptable = psl_is_cookie_domain_acceptable(psl, domain, co->domain); - Curl_psl_release(data); + bool acceptable = FALSE; + char lcase[256]; + char lcookie[256]; + size_t dlen = strlen(domain); + size_t clen = strlen(co->domain); + if((dlen < sizeof(lcase)) && (clen < sizeof(lcookie))) { + const psl_ctx_t *psl = Curl_psl_use(data); + if(psl) { + /* the PSL check requires lowercase domain name and pattern */ + Curl_strntolower(lcase, domain, dlen + 1); + Curl_strntolower(lcookie, co->domain, clen + 1); + acceptable = psl_is_cookie_domain_acceptable(psl, lcase, lcookie); + Curl_psl_release(data); + } + else + acceptable = !bad_domain(domain); } - else - acceptable = !bad_domain(domain); if(!acceptable) { infof(data, "cookie '%s' dropped, domain '%s' must not "