Title: http: reject control characters in http.request() · nodejs/node@15231aa · GitHub
Open Graph Title: http: reject control characters in http.request() · nodejs/node@15231aa
X Title: http: reject control characters in http.request() · nodejs/node@15231aa
Description: Node.js JavaScript runtime ✨🐢🚀✨. Contribute to nodejs/node development by creating an account on GitHub.
Open Graph Description: Unsanitized paths containing line feed characters can be used for header injection and request splitting so reject them with an exception. There seems to be no reasonable use case for allowing con...
X Description: Unsanitized paths containing line feed characters can be used for header injection and request splitting so reject them with an exception. There seems to be no reasonable use case for allowing con...
Opengraph URL: /nodejs/node/commit/15231aa6e56d64813994e04293e5adaeba24d0b8
X: @github
Domain: github.com
| route-pattern | /:user_id/:repository/commit/:name(/*path) |
| route-controller | commit |
| route-action | show |
| fetch-nonce | v2:168b5d23-6281-f804-1f97-df8f0eacbc50 |
| current-catalog-service-hash | f3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb |
| request-id | D882:26B7B1:BF114D:10726D2:6969F3F3 |
| html-safe-nonce | 30c91ead72c28cca68fb5082dc3ca02fae004e37510784d698bcf0f8dd3e5762 |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJEODgyOjI2QjdCMTpCRjExNEQ6MTA3MjZEMjo2OTY5RjNGMyIsInZpc2l0b3JfaWQiOiIyMzc0Mzg1OTQ3MzgyNTEwNTc5IiwicmVnaW9uX2VkZ2UiOiJpYWQiLCJyZWdpb25fcmVuZGVyIjoiaWFkIn0= |
| visitor-hmac | a81330d2761f1d4f2a2c90dd9a256d53c9e3ea358ef08c624d4a11a8eaae10bc |
| hovercard-subject-tag | repository:27193779 |
| github-keyboard-shortcuts | repository,commits,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/nodejs/node/commit/15231aa6e5 |
| twitter:image | https://opengraph.githubassets.com/29f6aa275adfedac81fae9cd97f330f8cbfe74b6714402387dbfb011b6e8f25d/nodejs/node/commit/15231aa6e56d64813994e04293e5adaeba24d0b8 |
| twitter:card | summary_large_image |
| og:image | https://opengraph.githubassets.com/29f6aa275adfedac81fae9cd97f330f8cbfe74b6714402387dbfb011b6e8f25d/nodejs/node/commit/15231aa6e56d64813994e04293e5adaeba24d0b8 |
| og:image:alt | Unsanitized paths containing line feed characters can be used for header injection and request splitting so reject them with an exception. There seems to be no reasonable use case for allowing con... |
| og:image:width | 1200 |
| og:image:height | 600 |
| og:site_name | GitHub |
| og:type | object |
| og:updated_time | 1489022954 |
| hostname | github.com |
| expected-hostname | github.com |
| None | 7b32f1c7c4549428ee399213e8345494fc55b5637195d3fc5f493657579235e8 |
| turbo-cache-control | no-cache |
| go-import | github.com/nodejs/node git https://github.com/nodejs/node.git |
| octolytics-dimension-user_id | 9950313 |
| octolytics-dimension-user_login | nodejs |
| octolytics-dimension-repository_id | 27193779 |
| octolytics-dimension-repository_nwo | nodejs/node |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | false |
| octolytics-dimension-repository_network_root_id | 27193779 |
| octolytics-dimension-repository_network_root_nwo | nodejs/node |
| turbo-body-classes | logged-out env-production page-responsive |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | bdde15ad1b403e23b08bbd89b53fbe6bdf688cad |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width