summaryrefslogtreecommitdiff
path: root/Tests
diff options
context:
space:
mode:
authorTimothy Flynn <trflynn89@pm.me>2023-03-03 08:40:12 -0500
committerTim Flynn <trflynn89@pm.me>2023-03-03 11:46:42 -0500
commitc4d78c29a2732f1443b59b1bedb9f56b93595d4e (patch)
tree677a09e2c08ed100cb8149076d127f92b9f69a39 /Tests
parent796a615bc1c5901bf99fab7278e0043692d65cdf (diff)
downloadserenity-c4d78c29a2732f1443b59b1bedb9f56b93595d4e.zip
AK: Invalidate overlong UTF-8 code point encodings
For example, the code point U+002F could be encoded as UTF-8 with the bytes 0x80 0xAF. This trick has historically been used to bypass security checks.
Diffstat (limited to 'Tests')
-rw-r--r--Tests/AK/TestUtf8.cpp41
1 files changed, 41 insertions, 0 deletions
diff --git a/Tests/AK/TestUtf8.cpp b/Tests/AK/TestUtf8.cpp
index 8c97246632..8dcc7d67fb 100644
--- a/Tests/AK/TestUtf8.cpp
+++ b/Tests/AK/TestUtf8.cpp
@@ -82,6 +82,47 @@ TEST_CASE(validate_invalid_ut8)
EXPECT(valid_bytes == 0);
}
+TEST_CASE(validate_overlong_utf8)
+{
+ size_t valid_bytes = 0;
+
+ // Overlong 2-byte encoding of U+002F
+ char invalid_utf8_1[] = { 42, 35, static_cast<char>(0xc0), static_cast<char>(0xaf) };
+ Utf8View utf8_1 { StringView { invalid_utf8_1, sizeof(invalid_utf8_1) } };
+ EXPECT(!utf8_1.validate(valid_bytes));
+ EXPECT(valid_bytes == 2);
+
+ // Overlong 3-byte encoding of U+002F
+ char invalid_utf8_2[] = { 42, 35, static_cast<char>(0xe0), static_cast<char>(0x80), static_cast<char>(0xaf) };
+ Utf8View utf8_2 { StringView { invalid_utf8_2, sizeof(invalid_utf8_2) } };
+ EXPECT(!utf8_2.validate(valid_bytes));
+ EXPECT(valid_bytes == 2);
+
+ // Overlong 4-byte encoding of U+002F
+ char invalid_utf8_3[] = { 42, 35, static_cast<char>(0xf0), static_cast<char>(0x80), static_cast<char>(0x80), static_cast<char>(0xaf) };
+ Utf8View utf8_3 { StringView { invalid_utf8_3, sizeof(invalid_utf8_3) } };
+ EXPECT(!utf8_3.validate(valid_bytes));
+ EXPECT(valid_bytes == 2);
+
+ // Overlong 3-byte encoding of U+00FF
+ char invalid_utf8_4[] = { 42, 35, static_cast<char>(0xe0), static_cast<char>(0x83), static_cast<char>(0xbf) };
+ Utf8View utf8_4 { StringView { invalid_utf8_4, sizeof(invalid_utf8_4) } };
+ EXPECT(!utf8_4.validate(valid_bytes));
+ EXPECT(valid_bytes == 2);
+
+ // Overlong 4-byte encoding of U+00FF
+ char invalid_utf8_5[] = { 42, 35, static_cast<char>(0xf0), static_cast<char>(0x80), static_cast<char>(0x83), static_cast<char>(0xbf) };
+ Utf8View utf8_5 { StringView { invalid_utf8_5, sizeof(invalid_utf8_5) } };
+ EXPECT(!utf8_5.validate(valid_bytes));
+ EXPECT(valid_bytes == 2);
+
+ // Overlong 4-byte encoding of U+0FFF
+ char invalid_utf8_6[] = { 42, 35, static_cast<char>(0xf0), static_cast<char>(0x8f), static_cast<char>(0xbf), static_cast<char>(0xbf) };
+ Utf8View utf8_6 { StringView { invalid_utf8_6, sizeof(invalid_utf8_6) } };
+ EXPECT(!utf8_6.validate(valid_bytes));
+ EXPECT(valid_bytes == 2);
+}
+
TEST_CASE(iterate_utf8)
{
Utf8View view("Some weird characters \u00A9\u266A\uA755"sv);