From: Ɓukasz Langa Date: Thu, 24 Aug 2023 20:21:07 +0000 (+0200) Subject: Fix invalid string escape X-Git-Tag: v3.8.19~27 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=0a728e78eb3eebaab2a7583e00cdfc3085e7c444;p=thirdparty%2FPython%2Fcpython.git Fix invalid string escape --- diff --git a/Lib/test/test_httpservers.py b/Lib/test/test_httpservers.py index 3806f7ac27a8..6b7c35f54b4e 100644 --- a/Lib/test/test_httpservers.py +++ b/Lib/test/test_httpservers.py @@ -417,10 +417,10 @@ class SimpleHTTPServerTestCase(BaseTestCase): def test_undecodable_parameter(self): # sanity check using a valid parameter response = self.request(self.base_url + '/?x=123').read() - self.assertRegex(response, f'listing for {self.base_url}/\?x=123'.encode('latin1')) + self.assertRegex(response, f'listing for {self.base_url}/\\?x=123'.encode('latin1')) # now the bogus encoding response = self.request(self.base_url + '/?x=%bb').read() - self.assertRegex(response, f'listing for {self.base_url}/\?x=\xef\xbf\xbd'.encode('latin1')) + self.assertRegex(response, f'listing for {self.base_url}/\\?x=\xef\xbf\xbd'.encode('latin1')) def test_get_dir_redirect_location_domain_injection_bug(self): """Ensure //evil.co/..%2f../../X does not put //evil.co/ in Location.