| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990 |
- import platform from '../platform/index.js';
- import utils from '../utils.js';
- import isURLSameOrigin from './isURLSameOrigin.js';
- import cookies from './cookies.js';
- import buildFullPath from '../core/buildFullPath.js';
- import mergeConfig from '../core/mergeConfig.js';
- import AxiosHeaders from '../core/AxiosHeaders.js';
- import buildURL from './buildURL.js';
- export default (config) => {
- const newConfig = mergeConfig({}, config);
- // Read only own properties to prevent prototype pollution gadgets
- // (e.g. Object.prototype.baseURL = 'https://evil.com'). See GHSA-q8qp-cvcw-x6jj.
- const own = (key) => (utils.hasOwnProp(newConfig, key) ? newConfig[key] : undefined);
- const data = own('data');
- let withXSRFToken = own('withXSRFToken');
- const xsrfHeaderName = own('xsrfHeaderName');
- const xsrfCookieName = own('xsrfCookieName');
- let headers = own('headers');
- const auth = own('auth');
- const baseURL = own('baseURL');
- const allowAbsoluteUrls = own('allowAbsoluteUrls');
- const url = own('url');
- newConfig.headers = headers = AxiosHeaders.from(headers);
- newConfig.url = buildURL(
- buildFullPath(baseURL, url, allowAbsoluteUrls),
- config.params,
- config.paramsSerializer
- );
- // HTTP basic authentication
- if (auth) {
- headers.set(
- 'Authorization',
- 'Basic ' +
- btoa(
- (auth.username || '') +
- ':' +
- (auth.password ? unescape(encodeURIComponent(auth.password)) : '')
- )
- );
- }
- if (utils.isFormData(data)) {
- if (platform.hasStandardBrowserEnv || platform.hasStandardBrowserWebWorkerEnv) {
- headers.setContentType(undefined); // browser handles it
- } else if (utils.isFunction(data.getHeaders)) {
- // Node.js FormData (like form-data package)
- const formHeaders = data.getHeaders();
- // Only set safe headers to avoid overwriting security headers
- const allowedHeaders = ['content-type', 'content-length'];
- Object.entries(formHeaders).forEach(([key, val]) => {
- if (allowedHeaders.includes(key.toLowerCase())) {
- headers.set(key, val);
- }
- });
- }
- }
- // Add xsrf header
- // This is only done if running in a standard browser environment.
- // Specifically not if we're in a web worker, or react-native.
- if (platform.hasStandardBrowserEnv) {
- if (utils.isFunction(withXSRFToken)) {
- withXSRFToken = withXSRFToken(newConfig);
- }
- // Strict boolean check — prevents proto-pollution gadgets (e.g. Object.prototype.withXSRFToken = 1)
- // and misconfigurations (e.g. "false") from short-circuiting the same-origin check and leaking
- // the XSRF token cross-origin. See GHSA-xx6v-rp6x-q39c.
- const shouldSendXSRF =
- withXSRFToken === true ||
- (withXSRFToken == null && isURLSameOrigin(newConfig.url));
- if (shouldSendXSRF) {
- const xsrfValue = xsrfHeaderName && xsrfCookieName && cookies.read(xsrfCookieName);
- if (xsrfValue) {
- headers.set(xsrfHeaderName, xsrfValue);
- }
- }
- }
- return newConfig;
- };
|