Changeset 391 for python/trunk/Lib/email/header.py
- Timestamp:
- Mar 19, 2014, 11:31:01 PM (11 years ago)
- Location:
- python/trunk
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
python/trunk
-
Property svn:mergeinfo
set to
/python/vendor/Python-2.7.6 merged eligible /python/vendor/current merged eligible
-
Property svn:mergeinfo
set to
-
python/trunk/Lib/email/header.py
r2 r391 47 47 # For use with .match() 48 48 fcre = re.compile(r'[\041-\176]+:$') 49 50 # Find a header embedded in a putative header value. Used to check for 51 # header injection attack. 52 _embeded_header = re.compile(r'\n[^ \t]+:') 49 53 50 54 … … 95 99 dec = email.quoprimime.header_decode(encoded) 96 100 elif encoding == 'b': 101 paderr = len(encoded) % 4 # Postel's law: add missing padding 102 if paderr: 103 encoded += '==='[:4 - paderr] 97 104 try: 98 105 dec = email.base64mime.decode(encoded) … … 405 412 lastchunk, lastcharset = newchunks[-1] 406 413 lastlen = lastcharset.encoded_header_len(lastchunk) 407 return self._encode_chunks(newchunks, maxlinelen) 414 value = self._encode_chunks(newchunks, maxlinelen) 415 if _embeded_header.search(value): 416 raise HeaderParseError("header value appears to contain " 417 "an embedded header: {!r}".format(value)) 418 return value 408 419 409 420
Note:
See TracChangeset
for help on using the changeset viewer.