mirror of
https://github.com/golang/go.git
synced 2026-01-29 07:02:05 +03:00
[release-branch.go1.24] net/url: add urlmaxqueryparams GODEBUG to limit the number of query parameters
net/url does not currently limit the number of query parameters parsed by url.ParseQuery or URL.Query. When parsing a application/x-www-form-urlencoded form, net/http.Request.ParseForm will parse up to 10 MB of query parameters. An input consisting of a large number of small, unique parameters can cause excessive memory consumption. We now limit the number of query parameters parsed to 10000 by default. The limit can be adjusted by setting GODEBUG=urlmaxqueryparams=<n>. Setting urlmaxqueryparams to 0 disables the limit. Thanks to jub0bs for reporting this issue. Fixes #77101 Fixes CVE-2025-61726 Change-Id: Iee3374c7ee2d8586dbf158536d3ade424203ff66 Reviewed-on: https://go-internal-review.googlesource.com/c/go/+/3020 Reviewed-by: Nicholas Husin <husin@google.com> Reviewed-by: Neal Patel <nealpatel@google.com> Reviewed-on: https://go-internal-review.googlesource.com/c/go/+/3326 Reviewed-by: Roland Shoemaker <bracewell@google.com> Reviewed-on: https://go-review.googlesource.com/c/go/+/736702 Auto-Submit: Michael Pratt <mpratt@google.com> Reviewed-by: Junyang Shao <shaojunyang@google.com> TryBot-Bypass: Michael Pratt <mpratt@google.com>
This commit is contained in:
committed by
Gopher Robot
parent
00b7309387
commit
85c794ddce
@@ -161,6 +161,13 @@ will fail early. The default value is `httpcookiemaxnum=3000`. Setting
|
||||
number of cookies. To avoid denial of service attacks, this setting and default
|
||||
was backported to Go 1.25.2 and Go 1.24.8.
|
||||
|
||||
Go 1.26 added a new `urlmaxqueryparams` setting that controls the maximum number
|
||||
of query parameters that net/url will accept when parsing a URL-encoded query string.
|
||||
If the number of parameters exceeds the number set in `urlmaxqueryparams`,
|
||||
parsing will fail early. The default value is `urlmaxqueryparams=10000`.
|
||||
Setting `urlmaxqueryparams=0`bles the limit. To avoid denial of service attacks,
|
||||
this setting and default was backported to Go 1.25.4 and Go 1.24.10.
|
||||
|
||||
### Go 1.24
|
||||
|
||||
Go 1.24 added a new `fips140` setting that controls whether the Go
|
||||
|
||||
@@ -61,6 +61,7 @@ var All = []Info{
|
||||
{Name: "tlsmlkem", Package: "crypto/tls", Changed: 24, Old: "0", Opaque: true},
|
||||
{Name: "tlsrsakex", Package: "crypto/tls", Changed: 22, Old: "1"},
|
||||
{Name: "tlsunsafeekm", Package: "crypto/tls", Changed: 22, Old: "1"},
|
||||
{Name: "urlmaxqueryparams", Package: "net/url", Changed: 24, Old: "0"},
|
||||
{Name: "winreadlinkvolume", Package: "os", Changed: 23, Old: "0"},
|
||||
{Name: "winsymlink", Package: "os", Changed: 23, Old: "0"},
|
||||
{Name: "x509keypairleaf", Package: "crypto/tls", Changed: 23, Old: "0"},
|
||||
|
||||
@@ -13,6 +13,7 @@ package url
|
||||
import (
|
||||
"errors"
|
||||
"fmt"
|
||||
"internal/godebug"
|
||||
"maps"
|
||||
"net/netip"
|
||||
"path"
|
||||
@@ -989,7 +990,30 @@ func ParseQuery(query string) (Values, error) {
|
||||
return m, err
|
||||
}
|
||||
|
||||
var urlmaxqueryparams = godebug.New("urlmaxqueryparams")
|
||||
|
||||
const defaultMaxParams = 10000
|
||||
|
||||
func urlParamsWithinMax(params int) bool {
|
||||
withinDefaultMax := params <= defaultMaxParams
|
||||
if urlmaxqueryparams.Value() == "" {
|
||||
return withinDefaultMax
|
||||
}
|
||||
customMax, err := strconv.Atoi(urlmaxqueryparams.Value())
|
||||
if err != nil {
|
||||
return withinDefaultMax
|
||||
}
|
||||
withinCustomMax := customMax == 0 || params < customMax
|
||||
if withinDefaultMax != withinCustomMax {
|
||||
urlmaxqueryparams.IncNonDefault()
|
||||
}
|
||||
return withinCustomMax
|
||||
}
|
||||
|
||||
func parseQuery(m Values, query string) (err error) {
|
||||
if !urlParamsWithinMax(strings.Count(query, "&") + 1) {
|
||||
return errors.New("number of URL query parameters exceeded limit")
|
||||
}
|
||||
for query != "" {
|
||||
var key string
|
||||
key, query, _ = strings.Cut(query, "&")
|
||||
|
||||
@@ -1496,6 +1496,54 @@ func TestParseQuery(t *testing.T) {
|
||||
}
|
||||
}
|
||||
|
||||
func TestParseQueryLimits(t *testing.T) {
|
||||
for _, test := range []struct {
|
||||
params int
|
||||
godebug string
|
||||
wantErr bool
|
||||
}{{
|
||||
params: 10,
|
||||
wantErr: false,
|
||||
}, {
|
||||
params: defaultMaxParams,
|
||||
wantErr: false,
|
||||
}, {
|
||||
params: defaultMaxParams + 1,
|
||||
wantErr: true,
|
||||
}, {
|
||||
params: 10,
|
||||
godebug: "urlmaxqueryparams=9",
|
||||
wantErr: true,
|
||||
}, {
|
||||
params: defaultMaxParams + 1,
|
||||
godebug: "urlmaxqueryparams=0",
|
||||
wantErr: false,
|
||||
}} {
|
||||
t.Setenv("GODEBUG", test.godebug)
|
||||
want := Values{}
|
||||
var b strings.Builder
|
||||
for i := range test.params {
|
||||
if i > 0 {
|
||||
b.WriteString("&")
|
||||
}
|
||||
p := fmt.Sprintf("p%v", i)
|
||||
b.WriteString(p)
|
||||
want[p] = []string{""}
|
||||
}
|
||||
query := b.String()
|
||||
got, err := ParseQuery(query)
|
||||
if gotErr, wantErr := err != nil, test.wantErr; gotErr != wantErr {
|
||||
t.Errorf("GODEBUG=%v ParseQuery(%v params) = %v, want error: %v", test.godebug, test.params, err, wantErr)
|
||||
}
|
||||
if err != nil {
|
||||
continue
|
||||
}
|
||||
if got, want := len(got), test.params; got != want {
|
||||
t.Errorf("GODEBUG=%v ParseQuery(%v params): got %v params, want %v", test.godebug, test.params, got, want)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
type RequestURITest struct {
|
||||
url *URL
|
||||
out string
|
||||
|
||||
@@ -354,6 +354,11 @@ Below is the full list of supported metrics, ordered lexicographically.
|
||||
The number of non-default behaviors executed by the crypto/tls
|
||||
package due to a non-default GODEBUG=tlsunsafeekm=... setting.
|
||||
|
||||
/godebug/non-default-behavior/urlmaxqueryparams:events
|
||||
The number of non-default behaviors executed by the net/url
|
||||
package due to a non-default GODEBUG=urlmaxqueryparams=...
|
||||
setting.
|
||||
|
||||
/godebug/non-default-behavior/winreadlinkvolume:events
|
||||
The number of non-default behaviors executed by the os package
|
||||
due to a non-default GODEBUG=winreadlinkvolume=... setting.
|
||||
|
||||
Reference in New Issue
Block a user