���� JFIF �� � ( %"1"%)+...383,7(-.-
![]() Server : Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.20 System : Linux st2.domain.com 3.10.0-1127.10.1.el7.x86_64 #1 SMP Wed Jun 3 14:28:03 UTC 2020 x86_64 User : apache ( 48) PHP Version : 7.4.20 Disable Function : NONE Directory : /home/real/node-v13.0.1/test/parallel/ |
'use strict'; const common = require('../common'); const http = require('http'); const net = require('net'); const url = require('url'); const assert = require('assert'); const Countdown = require('../common/countdown'); // Response splitting example, credit: Amit Klein, Safebreach const str = '/welcome?lang=bar%c4%8d%c4%8aContentLength:%200%c4%8d%c4%8a%c' + '4%8d%c4%8aHTTP/1.1%20200%20OK%c4%8d%c4%8aContentLength:%202' + '0%c4%8d%c4%8aLastModified:%20Mon,%2027%20Oct%202003%2014:50:18' + '%20GMT%c4%8d%c4%8aContentType:%20text/html%c4%8d%c4%8a%c4%8' + 'd%c4%8a%3chtml%3eGotcha!%3c/html%3e'; // Response splitting example, credit: Сковорода Никита Андреевич (@ChALkeR) const x = 'fooഊSet-Cookie: foo=barഊഊ<script>alert("Hi!")</script>'; const y = 'foo⠊Set-Cookie: foo=bar'; let count = 0; const countdown = new Countdown(3, () => server.close()); function test(res, code, key, value) { const header = { [key]: value }; common.expectsError( () => res.writeHead(code, header), { code: 'ERR_INVALID_CHAR', type: TypeError, message: `Invalid character in header content ["${key}"]` } ); } const server = http.createServer((req, res) => { switch (count++) { case 0: const loc = url.parse(req.url, true).query.lang; test(res, 302, 'Location', `/foo?lang=${loc}`); break; case 1: test(res, 200, 'foo', x); break; case 2: test(res, 200, 'foo', y); break; default: assert.fail('should not get to here.'); } countdown.dec(); res.end('ok'); }); server.listen(0, () => { const end = 'HTTP/1.1\r\n\r\n'; const client = net.connect({ port: server.address().port }, () => { client.write(`GET ${str} ${end}`); client.write(`GET / ${end}`); client.write(`GET / ${end}`); client.end(); }); });