]> granicus.if.org Git - curl/commitdiff
urlapi: fix portnumber parsing for ipv6 zone index
authorDaniel Gustafsson <daniel@yesql.se>
Tue, 11 Dec 2018 14:02:19 +0000 (15:02 +0100)
committerDaniel Gustafsson <daniel@yesql.se>
Tue, 11 Dec 2018 14:02:19 +0000 (15:02 +0100)
An IPv6 URL which contains a zone index includes a '%%25<zode id>'
string before the ending ']' bracket. The parsing logic wasn't set
up to cope with the zone index however, resulting in a malformed url
error being returned. Fix by breaking the parsing into two stages
to correctly handle the zone index.

Closes #3355
Closes #3319
Reported-by: tonystz on Github
Reviewed-by: Daniel Stenberg <daniel@haxx.se>
Reviewed-by: Marcel Raad <Marcel.Raad@teamviewer.com>
lib/urlapi.c

index be9958cd890d7a9ac73ce1a6f38e4e5fdc4fcb91..21942ebadf1447d6ebc6f84f4b8a6c9ac0758048 100644 (file)
@@ -490,16 +490,30 @@ static CURLUcode parse_hostname_login(struct Curl_URL *u,
 
 static CURLUcode parse_port(struct Curl_URL *u, char *hostname)
 {
-  char *portptr;
+  char *portptr = NULL;
   char endbracket;
   int len;
 
-  if((1 == sscanf(hostname, "[%*45[0123456789abcdefABCDEF:.%%]%c%n",
-                  &endbracket, &len)) &&
-     (']' == endbracket)) {
+  /*
+   * Find the end of an IPv6 address, either on the ']' ending bracket or
+   * a percent-encoded zone index.
+   */
+  if(1 == sscanf(hostname, "[%*45[0123456789abcdefABCDEF:.]%c%n",
+                 &endbracket, &len)) {
+    if(']' == endbracket)
+      portptr = &hostname[len];
+    else if('%' == endbracket) {
+      int zonelen = len;
+      if(1 == sscanf(hostname + zonelen, "25%*[^]]]%c%n", &endbracket, &len))
+        portptr = &hostname[--zonelen + len];
+      else
+        return CURLUE_MALFORMED_INPUT;
+    }
+    else
+      return CURLUE_MALFORMED_INPUT;
+
     /* this is a RFC2732-style specified IP-address */
-    portptr = &hostname[len];
-    if(*portptr) {
+    if(portptr && *portptr) {
       if(*portptr != ':')
         return CURLUE_MALFORMED_INPUT;
     }