From: Ɓukasz Langa Date: Thu, 24 Aug 2023 17:44:27 +0000 (+0200) Subject: Fix invalid string escape X-Git-Tag: v3.9.18~1 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=92f9ce726b7c5ea79b1b1451223220a3b35fc845;p=thirdparty%2FPython%2Fcpython.git Fix invalid string escape --- diff --git a/Lib/test/test_httpservers.py b/Lib/test/test_httpservers.py index 153206da1a31..b70a109c27c4 100644 --- a/Lib/test/test_httpservers.py +++ b/Lib/test/test_httpservers.py @@ -418,10 +418,10 @@ class SimpleHTTPServerTestCase(BaseTestCase): def test_undecodable_parameter(self): # sanity check using a valid parameter response = self.request(self.base_url + '/?x=123').read() - self.assertRegex(response, f'listing for {self.base_url}/\?x=123'.encode('latin1')) + self.assertRegex(response, f'listing for {self.base_url}/\\?x=123'.encode('latin1')) # now the bogus encoding response = self.request(self.base_url + '/?x=%bb').read() - self.assertRegex(response, f'listing for {self.base_url}/\?x=\xef\xbf\xbd'.encode('latin1')) + self.assertRegex(response, f'listing for {self.base_url}/\\?x=\xef\xbf\xbd'.encode('latin1')) def test_get_dir_redirect_location_domain_injection_bug(self): """Ensure //evil.co/..%2f../../X does not put //evil.co/ in Location.