diff options
author | David Rothstein <drothstein@gmail.com> | 2016-02-24 14:25:49 -0500 |
---|---|---|
committer | David Rothstein <drothstein@gmail.com> | 2016-02-24 14:25:49 -0500 |
commit | b8d9c44f83eca57039f648a0edb0f369f8d3e6b4 (patch) | |
tree | 2b97fdea5a364b7abc6728fb364244c0a52cbc73 /includes | |
parent | 2f54b101bf722849e456d859876b27b90ad7e479 (diff) | |
download | brdo-b8d9c44f83eca57039f648a0edb0f369f8d3e6b4.tar.gz brdo-b8d9c44f83eca57039f648a0edb0f369f8d3e6b4.tar.bz2 |
Revert "Drupal 7.43"
This reverts commit 2f54b101bf722849e456d859876b27b90ad7e479.
Diffstat (limited to 'includes')
-rw-r--r-- | includes/bootstrap.inc | 2 | ||||
-rw-r--r-- | includes/common.inc | 37 | ||||
-rw-r--r-- | includes/path.inc | 3 | ||||
-rw-r--r-- | includes/xmlrpcs.inc | 8 |
4 files changed, 20 insertions, 30 deletions
diff --git a/includes/bootstrap.inc b/includes/bootstrap.inc index 0428bd362..3dde2740c 100644 --- a/includes/bootstrap.inc +++ b/includes/bootstrap.inc @@ -8,7 +8,7 @@ /** * The current system version. */ -define('VERSION', '7.43'); +define('VERSION', '7.43-dev'); /** * Core API compatibility. diff --git a/includes/common.inc b/includes/common.inc index c6303efad..34fa9b962 100644 --- a/includes/common.inc +++ b/includes/common.inc @@ -688,13 +688,6 @@ function drupal_goto($path = '', array $options = array(), $http_response_code = $options['fragment'] = $destination['fragment']; } - // In some cases modules call drupal_goto(current_path()). We need to ensure - // that such a redirect is not to an external URL. - if ($path === current_path() && empty($options['external']) && url_is_external($path)) { - // Force url() to generate a non-external URL. - $options['external'] = FALSE; - } - drupal_alter('drupal_goto', $path, $options, $http_response_code); // The 'Location' HTTP header must be absolute. @@ -2227,8 +2220,20 @@ function url($path = NULL, array $options = array()) { 'prefix' => '' ); + // A duplicate of the code from url_is_external() to avoid needing another + // function call, since performance inside url() is critical. if (!isset($options['external'])) { - $options['external'] = url_is_external($path); + // Return an external link if $path contains an allowed absolute URL. Avoid + // calling drupal_strip_dangerous_protocols() if there is any slash (/), + // hash (#) or question_mark (?) before the colon (:) occurrence - if any - + // as this would clearly mean it is not a URL. If the path starts with 2 + // slashes then it is always considered an external URL without an explicit + // protocol part. + $colonpos = strpos($path, ':'); + $options['external'] = (strpos($path, '//') === 0) + || ($colonpos !== FALSE + && !preg_match('![/?#]!', substr($path, 0, $colonpos)) + && drupal_strip_dangerous_protocols($path) == $path); } // Preserve the original path before altering or aliasing. @@ -2348,18 +2353,12 @@ function url($path = NULL, array $options = array()) { */ function url_is_external($path) { $colonpos = strpos($path, ':'); - // Some browsers treat \ as / so normalize to forward slashes. - $path = str_replace('\\', '/', $path); - // If the path starts with 2 slashes then it is always considered an external - // URL without an explicit protocol part. + // Avoid calling drupal_strip_dangerous_protocols() if there is any slash (/), + // hash (#) or question_mark (?) before the colon (:) occurrence - if any - as + // this would clearly mean it is not a URL. If the path starts with 2 slashes + // then it is always considered an external URL without an explicit protocol + // part. return (strpos($path, '//') === 0) - // Leading control characters may be ignored or mishandled by browsers, so - // assume such a path may lead to an external location. The \p{C} character - // class matches all UTF-8 control, unassigned, and private characters. - || (preg_match('/^\p{C}/u', $path) !== 0) - // Avoid calling drupal_strip_dangerous_protocols() if there is any slash - // (/), hash (#) or question_mark (?) before the colon (:) occurrence - if - // any - as this would clearly mean it is not a URL. || ($colonpos !== FALSE && !preg_match('![/?#]!', substr($path, 0, $colonpos)) && drupal_strip_dangerous_protocols($path) == $path); diff --git a/includes/path.inc b/includes/path.inc index 6bd48d306..2e3571114 100644 --- a/includes/path.inc +++ b/includes/path.inc @@ -347,8 +347,7 @@ function drupal_match_path($path, $patterns) { * drupal_bootstrap(DRUPAL_BOOTSTRAP_FULL) makes this function available. * * @return - * The current Drupal URL path. The path is untrusted user input and must be - * treated as such. + * The current Drupal URL path. * * @see request_path() */ diff --git a/includes/xmlrpcs.inc b/includes/xmlrpcs.inc index c334de159..8655c05b0 100644 --- a/includes/xmlrpcs.inc +++ b/includes/xmlrpcs.inc @@ -264,10 +264,6 @@ function xmlrpc_server_call($xmlrpc_server, $methodname, $args) { */ function xmlrpc_server_multicall($methodcalls) { // See http://www.xmlrpc.com/discuss/msgReader$1208 - // To avoid multicall expansion attacks, limit the number of duplicate method - // calls allowed with a default of 1. Set to -1 for unlimited. - $duplicate_method_limit = variable_get('xmlrpc_multicall_duplicate_method_limit', 1); - $method_count = array(); $return = array(); $xmlrpc_server = xmlrpc_server_get(); foreach ($methodcalls as $call) { @@ -277,14 +273,10 @@ function xmlrpc_server_multicall($methodcalls) { $ok = FALSE; } $method = $call['methodName']; - $method_count[$method] = isset($method_count[$method]) ? $method_count[$method] + 1 : 1; $params = $call['params']; if ($method == 'system.multicall') { $result = xmlrpc_error(-32600, t('Recursive calls to system.multicall are forbidden.')); } - elseif ($duplicate_method_limit > 0 && $method_count[$method] > $duplicate_method_limit) { - $result = xmlrpc_error(-156579, t('Too many duplicate method calls in system.multicall.')); - } elseif ($ok) { $result = xmlrpc_server_call($xmlrpc_server, $method, $params); } |