mirror of
https://github.com/grafana/grafana.git
synced 2025-02-25 18:55:37 -06:00
Middleware: Fix IPv6 host parsing in CSRF check (#45911)
- Also create tests for this middleware Co-authored-by: Kyle Brandt <kyle@grafana.com>
This commit is contained in:
parent
e814e7364b
commit
06ed5efdf0
@ -467,7 +467,7 @@ func (hs *HTTPServer) addMiddlewaresAndStaticRoutes() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
m.Use(middleware.Recovery(hs.Cfg))
|
m.Use(middleware.Recovery(hs.Cfg))
|
||||||
m.UseMiddleware(middleware.CSRF(hs.Cfg.LoginCookieName))
|
m.UseMiddleware(middleware.CSRF(hs.Cfg.LoginCookieName, hs.log))
|
||||||
|
|
||||||
hs.mapStatic(m, hs.Cfg.StaticRootPath, "build", "public/build")
|
hs.mapStatic(m, hs.Cfg.StaticRootPath, "build", "public/build")
|
||||||
hs.mapStatic(m, hs.Cfg.StaticRootPath, "", "public", "/public/views/swagger.html")
|
hs.mapStatic(m, hs.Cfg.StaticRootPath, "", "public", "/public/views/swagger.html")
|
||||||
|
@ -4,10 +4,12 @@ import (
|
|||||||
"errors"
|
"errors"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/url"
|
"net/url"
|
||||||
"strings"
|
|
||||||
|
"github.com/grafana/grafana/pkg/infra/log"
|
||||||
|
"github.com/grafana/grafana/pkg/util"
|
||||||
)
|
)
|
||||||
|
|
||||||
func CSRF(loginCookieName string) func(http.Handler) http.Handler {
|
func CSRF(loginCookieName string, logger log.Logger) func(http.Handler) http.Handler {
|
||||||
// As per RFC 7231/4.2.2 these methods are idempotent:
|
// As per RFC 7231/4.2.2 these methods are idempotent:
|
||||||
// (GET is excluded because it may have side effects in some APIs)
|
// (GET is excluded because it may have side effects in some APIs)
|
||||||
safeMethods := []string{"HEAD", "OPTIONS", "TRACE"}
|
safeMethods := []string{"HEAD", "OPTIONS", "TRACE"}
|
||||||
@ -27,12 +29,21 @@ func CSRF(loginCookieName string) func(http.Handler) http.Handler {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
// Otherwise - verify that Origin matches the server origin
|
// Otherwise - verify that Origin matches the server origin
|
||||||
host := strings.Split(r.Host, ":")[0]
|
netAddr, err := util.SplitHostPortDefault(r.Host, "", "0") // we ignore the port
|
||||||
|
if err != nil {
|
||||||
|
http.Error(w, err.Error(), http.StatusBadRequest)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
origin, err := url.Parse(r.Header.Get("Origin"))
|
origin, err := url.Parse(r.Header.Get("Origin"))
|
||||||
if err != nil || (origin.String() != "" && origin.Hostname() != host) {
|
if err != nil {
|
||||||
|
logger.Error("error parsing Origin header", "err", err)
|
||||||
|
}
|
||||||
|
if err != nil || netAddr.Host == "" || (origin.String() != "" && origin.Hostname() != netAddr.Host) {
|
||||||
http.Error(w, "origin not allowed", http.StatusForbidden)
|
http.Error(w, "origin not allowed", http.StatusForbidden)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
next.ServeHTTP(w, r)
|
next.ServeHTTP(w, r)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
124
pkg/middleware/csrf_test.go
Normal file
124
pkg/middleware/csrf_test.go
Normal file
@ -0,0 +1,124 @@
|
|||||||
|
package middleware
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
"net/http/httptest"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/grafana/grafana/pkg/infra/log"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestMiddlewareCSRF(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
cookieName string
|
||||||
|
method string
|
||||||
|
origin string
|
||||||
|
host string
|
||||||
|
code int
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "mismatched origin and host is forbidden",
|
||||||
|
cookieName: "foo",
|
||||||
|
method: "GET",
|
||||||
|
origin: "http://notLocalhost",
|
||||||
|
host: "localhost",
|
||||||
|
code: http.StatusForbidden,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "mismatched origin and host is NOT forbidden with a 'Safe Method'",
|
||||||
|
cookieName: "foo",
|
||||||
|
method: "TRACE",
|
||||||
|
origin: "http://notLocalhost",
|
||||||
|
host: "localhost",
|
||||||
|
code: http.StatusOK,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "mismatched origin and host is NOT forbidden without a cookie",
|
||||||
|
cookieName: "",
|
||||||
|
method: "GET",
|
||||||
|
origin: "http://notLocalhost",
|
||||||
|
host: "localhost",
|
||||||
|
code: http.StatusOK,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "malformed host is a bad request",
|
||||||
|
cookieName: "foo",
|
||||||
|
method: "GET",
|
||||||
|
host: "localhost:80:80",
|
||||||
|
code: http.StatusBadRequest,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "host works without port",
|
||||||
|
cookieName: "foo",
|
||||||
|
method: "GET",
|
||||||
|
host: "localhost",
|
||||||
|
origin: "http://localhost",
|
||||||
|
code: http.StatusOK,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "port does not have to match",
|
||||||
|
cookieName: "foo",
|
||||||
|
method: "GET",
|
||||||
|
host: "localhost:80",
|
||||||
|
origin: "http://localhost:3000",
|
||||||
|
code: http.StatusOK,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "IPv6 host works with port",
|
||||||
|
cookieName: "foo",
|
||||||
|
method: "GET",
|
||||||
|
host: "[::1]:3000",
|
||||||
|
origin: "http://[::1]:3000",
|
||||||
|
code: http.StatusOK,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "IPv6 host (with longer address) works with port",
|
||||||
|
cookieName: "foo",
|
||||||
|
method: "GET",
|
||||||
|
host: "[2001:db8::1]:3000",
|
||||||
|
origin: "http://[2001:db8::1]:3000",
|
||||||
|
code: http.StatusOK,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "IPv6 host (with longer address) works without port",
|
||||||
|
cookieName: "foo",
|
||||||
|
method: "GET",
|
||||||
|
host: "[2001:db8::1]",
|
||||||
|
origin: "http://[2001:db8::1]",
|
||||||
|
code: http.StatusOK,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
rr := csrfScenario(t, tt.cookieName, tt.method, tt.origin, tt.host)
|
||||||
|
require.Equal(t, tt.code, rr.Code)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func csrfScenario(t *testing.T, cookieName, method, origin, host string) *httptest.ResponseRecorder {
|
||||||
|
req, err := http.NewRequest(method, "/", nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
req.AddCookie(&http.Cookie{
|
||||||
|
Name: cookieName,
|
||||||
|
})
|
||||||
|
|
||||||
|
// Note: Not sure where host header populates req.Host, or how that works.
|
||||||
|
req.Host = host
|
||||||
|
req.Header.Set("HOST", host)
|
||||||
|
|
||||||
|
req.Header.Set("ORIGIN", origin)
|
||||||
|
|
||||||
|
testHandler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
|
||||||
|
})
|
||||||
|
|
||||||
|
rr := httptest.NewRecorder()
|
||||||
|
handler := CSRF(cookieName, log.New())(testHandler)
|
||||||
|
handler.ServeHTTP(rr, req)
|
||||||
|
return rr
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user