Skip Menu |

This queue is for tickets about the CGI-Cookie-XS CPAN distribution.

Report information
The Basics
Id: 39120
Status: resolved
Priority: 0/
Queue: CGI-Cookie-XS

People
Owner: Nobody in particular
Requestors: yorhel [...] cpan.org
Cc:
AdminCc:

Bug Information
Severity: Critical
Broken in: 0.13
Fixed in: (no value)



Subject: Segmentation fault on incorrect or empty cookie strings
Calling parse with an incorrect cookie or empty string causes CGI::Cookie:XS to segfault: $ perl -MCGI::Cookie::XS -e 'CGI::Cookie::XS->parse("")' Segmentation fault $ perl -MCGI::Cookie::XS -e 'CGI::Cookie::XS->parse("a")' Segmentation fault $ perl -MCGI::Cookie::XS -e 'CGI::Cookie::XS->parse("this-is-not-a-cookie")' Segmentation fault Seems like a pretty serious security vulnerability to me, considering anyone can send a malicious Cookie HTTP header... perl v5.10.0 built for i686-linux-thread-multi CGI::Cookie::XS v1.13
Thanks for catching these. I've rewritten most of C stuff and added many tests to ensure this module behaves the same way as the latest CGI::Cookie module. I think I've fixed these in the 0.14 release which will appear on the CPAN mirror near you in the next few hours. Maybe you would like to try out the SVN head first? ( http://svn.openfoundry.org/cookieparser ) If you have found further issues, please let me know :) Thanks!