Merge pull request #480 from Niccolo10/fix/cve-2026-43644-echo-content-type

fix: set Content-Type to prevent MIME-sniff XSS (CVE-2026-43644)
This commit is contained in:
Stefan Prodan
2026-05-19 14:13:37 +03:00
committed by GitHub
2 changed files with 31 additions and 0 deletions

View File

@@ -102,6 +102,9 @@ func (s *Server) echoHandler(w http.ResponseWriter, r *http.Request) {
s.JSONResponse(w, r, result)
} else {
w.Header().Set("Content-Type", "application/octet-stream")
w.Header().Set("X-Content-Type-Options", "nosniff")
w.Header().Set("Content-Security-Policy", "default-src 'none'")
w.Header().Set("X-Color", s.config.UIColor)
w.WriteHeader(http.StatusAccepted)
w.Write(body)

View File

@@ -46,3 +46,31 @@ func TestEchoHandler(t *testing.T) {
}
}
}
func TestEchoHandler_ContentType(t *testing.T) {
srv := NewMockServer()
handler := http.HandlerFunc(srv.echoHandler)
payload := "<html><script>alert(1)</script></html>"
req, err := http.NewRequest("POST", "/echo", strings.NewReader(payload))
if err != nil {
t.Fatal(err)
}
rr := httptest.NewRecorder()
handler.ServeHTTP(rr, req)
if rr.Code != http.StatusAccepted {
t.Fatalf("echo returned status %d, want %d", rr.Code, http.StatusAccepted)
}
expectedHeaders := map[string]string{
"Content-Type": "application/octet-stream",
"X-Content-Type-Options": "nosniff",
"Content-Security-Policy": "default-src 'none'",
}
for header, want := range expectedHeaders {
if got := rr.Header().Get(header); got != want {
t.Errorf("%s = %q, want %q", header, got, want)
}
}
}