tests: test CRLF in URLs

Related to the security vulnerability: CVE-2012-0036

Bug: http://curl.haxx.se/docs/adv_20120124.html
This commit is contained in:
Daniel Stenberg 2012-01-11 15:46:19 +01:00
parent 75ca568fa1
commit c11c30a8c8
4 changed files with 88 additions and 1 deletions

View File

@ -82,7 +82,7 @@ test1220 \
test1300 test1301 test1302 test1303 test1304 test1305 \
test1306 test1307 test1308 test1309 test1310 test1311 test1312 test1313 \
test1314 test1315 test1316 test1317 test1318 test1319 test1320 test1321 \
test1325 test1326 test1327 \
test1322 test1323 test1324 test1325 test1326 test1327 \
test2000 test2001 test2002 test2003 test2004
EXTRA_DIST = $(TESTCASES) DISABLED

29
tests/data/test1322 Normal file
View File

@ -0,0 +1,29 @@
<testcase>
<info>
<keywords>
POP3
CRLF-in-URL
</keywords>
</info>
# Client-side
<client>
<server>
pop3
</server>
<name>
POP3 with URL-encoded CR LF in the URL
</name>
<command>
pop3://%HOSTIP:%POP3PORT/%0d%0a/1322
</command>
</client>
#
<verify>
# 3 - CURLE_URL_MALFORMAT
<errorcode>
3
</errorcode>
</verify>
</testcase>

29
tests/data/test1323 Normal file
View File

@ -0,0 +1,29 @@
<testcase>
<info>
<keywords>
SMTP
CRLF-in-URL
</keywords>
</info>
# Client-side
<client>
<server>
smtp
</server>
<name>
SMTP with URL-encoded CR LF in the URL
</name>
<command>
smtp://%HOSTIP:%SMTPPORT/%0d%0a/1323
</command>
</client>
#
<verify>
# 3 - CURLE_URL_MALFORMAT
<errorcode>
3
</errorcode>
</verify>
</testcase>

29
tests/data/test1324 Normal file
View File

@ -0,0 +1,29 @@
<testcase>
<info>
<keywords>
IMAP
CRLF-in-URL
</keywords>
</info>
# Client-side
<client>
<server>
imap
</server>
<name>
IMAP with URL-encoded CR LF in the URL
</name>
<command>
imap://%HOSTIP:%IMAPPORT/%0d%0a/1322
</command>
</client>
#
<verify>
# 3 - CURLE_URL_MALFORMAT
<errorcode>
3
</errorcode>
</verify>
</testcase>