Skip to content

Conversation

@sergei-maertens
Copy link
Contributor

Closes #135

Handle some edge cases around malformed cookie strings that may cause crashes. While our own library is not suspected to generate invalid cookie strings, there are ways to bypass input validation of the models and even the cookie value may be set by javascript or people running fuzzers, leading to the cookie value being untrusted input that must be sanitized properly.

Handle some edge cases around malformed cookie strings that may
cause crashes. While our own library is not suspected to generate
invalid cookie strings, there are ways to bypass input validation
of the models and even the cookie value may be set by javascript
or people running fuzzers, leading to the cookie value being
untrusted input that must be sanitized properly.
@sergei-maertens sergei-maertens merged commit 0c149b0 into master Jul 6, 2025
18 checks passed
@sergei-maertens sergei-maertens deleted the issue/135-crash-cookie-str-true branch July 6, 2025 13:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

parse_cookie_str can be crashed by end users via cookie_str = 'true'

2 participants