mirror of
https://github.com/pgadmin-org/pgadmin4.git
synced 2025-02-25 18:55:31 -06:00
Fixed CSRF security vulnerability issue. per Alvin Lindstam. Fixes #4217
Initial patch by: Khushboo Vashi Modified by: Ashesh Vashi and Murtuza Zabuawala
This commit is contained in:
committed by
Akshay Joshi
parent
90a45557b9
commit
6f0eafb223
124
web/regression/python_test_utils/csrf_test_client.py
Normal file
124
web/regression/python_test_utils/csrf_test_client.py
Normal file
@@ -0,0 +1,124 @@
|
||||
##########################################################################
|
||||
#
|
||||
# pgAdmin 4 - PostgreSQL Tools
|
||||
#
|
||||
# Copyright (C) 2013 - 2019, The pgAdmin Development Team
|
||||
# This software is released under the PostgreSQL Licence
|
||||
#
|
||||
##########################################################################
|
||||
|
||||
import re
|
||||
import flask
|
||||
from flask import current_app, request, session, testing
|
||||
|
||||
from werkzeug.datastructures import Headers
|
||||
from werkzeug.test import EnvironBuilder
|
||||
from flask_wtf.csrf import generate_csrf
|
||||
import config
|
||||
|
||||
|
||||
class RequestShim(object):
|
||||
"""
|
||||
A fake request that proxies cookie-related methods to a Flask test client.
|
||||
"""
|
||||
def __init__(self, client):
|
||||
self.client = client
|
||||
|
||||
def set_cookie(self, key, value='', *args, **kwargs):
|
||||
"Set the cookie on the Flask test client."
|
||||
server_name = current_app.config["SERVER_NAME"] or "localhost"
|
||||
return self.client.set_cookie(
|
||||
server_name, key=key, value=value, *args, **kwargs
|
||||
)
|
||||
|
||||
def delete_cookie(self, key, *args, **kwargs):
|
||||
"Delete the cookie on the Flask test client."
|
||||
server_name = current_app.config["SERVER_NAME"] or "localhost"
|
||||
return self.client.delete_cookie(
|
||||
server_name, key=key, *args, **kwargs
|
||||
)
|
||||
|
||||
|
||||
class TestClient(testing.FlaskClient):
|
||||
|
||||
def __init__(self, *args, **kwargs):
|
||||
self.csrf_token = None
|
||||
self.app = None
|
||||
super(TestClient, self).__init__(*args, **kwargs)
|
||||
|
||||
def setApp(self, _app):
|
||||
self.app = _app
|
||||
|
||||
def open(self, *args, **kwargs):
|
||||
if len(args) > 0 and isinstance(args[0], (EnvironBuilder, dict)):
|
||||
return super(TestClient, self).open(*args, **kwargs)
|
||||
|
||||
data = kwargs.get('data', {})
|
||||
|
||||
if self.csrf_token is not None and not (
|
||||
'email' in data and
|
||||
'password' in data and
|
||||
'csrf_token' in data
|
||||
):
|
||||
api_key_headers = Headers({})
|
||||
api_key_headers[
|
||||
getattr(config, 'WTF_CSRF_HEADERS', ['X-CSRFToken'])[0]
|
||||
] = self.csrf_token
|
||||
headers = kwargs.pop('headers', Headers())
|
||||
headers.extend(api_key_headers)
|
||||
kwargs['headers'] = headers
|
||||
|
||||
return super(TestClient, self).open(*args, **kwargs)
|
||||
|
||||
def fetch_csrf(self, res):
|
||||
m = re.search(
|
||||
b'<input id="csrf_token" name="csrf_token" type="hidden"'
|
||||
b' value="([^"]*)">', res.data
|
||||
)
|
||||
|
||||
return m.group(1).decode("utf-8")
|
||||
|
||||
def generate_csrf_token(self, *args, **kwargs):
|
||||
# First, we'll wrap our request shim around the test client, so
|
||||
# that it will work correctly when Flask asks it to set a cookie.
|
||||
request = RequestShim(self)
|
||||
# Next, we need to look up any cookies that might already exist on
|
||||
# this test client, such as the secure cookie that
|
||||
# powers `flask.session`,
|
||||
# and make a test request context that has those cookies in it.
|
||||
environ_overrides = {}
|
||||
self.cookie_jar.inject_wsgi(environ_overrides)
|
||||
with self.app.test_request_context(
|
||||
"/login", environ_overrides=environ_overrides,
|
||||
):
|
||||
# Now, we call Flask-WTF's method of generating a CSRF token...
|
||||
csrf_token = generate_csrf()
|
||||
# ...which also sets a value in `flask.session`, so we need to
|
||||
# ask Flask to save that value to the cookie jar in the test
|
||||
# client. This is where we actually use that request shim we
|
||||
# made!
|
||||
self.app.save_session(flask.session, request)
|
||||
|
||||
return csrf_token
|
||||
|
||||
def login(self, email, password, _follow_redirects=False):
|
||||
if config.SERVER_MODE is True:
|
||||
res = self.get('/login', follow_redirects=True)
|
||||
csrf_token = self.fetch_csrf(res)
|
||||
else:
|
||||
csrf_token = self.generate_csrf_token()
|
||||
|
||||
res = self.post(
|
||||
'/login', data=dict(
|
||||
email=email, password=password,
|
||||
csrf_token=csrf_token,
|
||||
),
|
||||
follow_redirects=_follow_redirects
|
||||
)
|
||||
self.csrf_token = csrf_token
|
||||
|
||||
return res
|
||||
|
||||
def logout(self):
|
||||
res = self.get('/logout', follow_redirects=False)
|
||||
self.csrf_token = None
|
||||
@@ -51,8 +51,7 @@ def login_tester_account(tester):
|
||||
os.environ['PGADMIN_SETUP_PASSWORD']:
|
||||
email = os.environ['PGADMIN_SETUP_EMAIL']
|
||||
password = os.environ['PGADMIN_SETUP_PASSWORD']
|
||||
tester.post('/login', data=dict(email=email, password=password),
|
||||
follow_redirects=True)
|
||||
tester.login(email, password)
|
||||
else:
|
||||
from regression.runtests import app_starter
|
||||
print("Unable to login test client, email and password not found.",
|
||||
@@ -61,18 +60,6 @@ def login_tester_account(tester):
|
||||
sys.exit(1)
|
||||
|
||||
|
||||
def logout_tester_account(tester):
|
||||
"""
|
||||
This function logout the test account
|
||||
|
||||
:param tester: test client
|
||||
:type tester: flask test client object
|
||||
:return: None
|
||||
"""
|
||||
|
||||
tester.get('/logout')
|
||||
|
||||
|
||||
def get_config_data():
|
||||
"""This function reads the server data from config_data"""
|
||||
server_data = []
|
||||
@@ -802,7 +789,8 @@ def _cleanup(tester, app_starter):
|
||||
traceback.print_exc(file=sys.stderr)
|
||||
finally:
|
||||
# Logout the test client
|
||||
logout_tester_account(tester)
|
||||
tester.logout()
|
||||
|
||||
# Remove SQLite db file
|
||||
remove_db_file()
|
||||
if app_starter:
|
||||
|
||||
Reference in New Issue
Block a user