Merge pull request #2987 from coreos-inc/joseph.schorr/QUAY-805/dot-fix
Add decorator to prevent reflected text attacks
This commit is contained in:
commit
4857cd9c48
9 changed files with 86 additions and 6 deletions
|
@ -503,3 +503,7 @@ class DefaultConfig(ImmutableConfig):
|
||||||
|
|
||||||
# The size of pages returned by the Docker V2 API.
|
# The size of pages returned by the Docker V2 API.
|
||||||
V2_PAGINATION_SIZE = 50
|
V2_PAGINATION_SIZE = 50
|
||||||
|
|
||||||
|
# If enabled, ensures that API calls are made with the X-Requested-With header
|
||||||
|
# when called from a browser.
|
||||||
|
BROWSER_API_CALLS_XHR_ONLY = True
|
||||||
|
|
|
@ -21,7 +21,7 @@ from auth.decorators import process_oauth
|
||||||
from endpoints.csrf import csrf_protect
|
from endpoints.csrf import csrf_protect
|
||||||
from endpoints.exception import (Unauthorized, InvalidRequest, InvalidResponse,
|
from endpoints.exception import (Unauthorized, InvalidRequest, InvalidResponse,
|
||||||
FreshLoginRequired, NotFound)
|
FreshLoginRequired, NotFound)
|
||||||
from endpoints.decorators import check_anon_protection
|
from endpoints.decorators import check_anon_protection, require_xhr_from_browser
|
||||||
from util.metrics.metricqueue import time_decorator
|
from util.metrics.metricqueue import time_decorator
|
||||||
from util.names import parse_namespace_repository
|
from util.names import parse_namespace_repository
|
||||||
from util.pagination import encrypt_page_token, decrypt_page_token
|
from util.pagination import encrypt_page_token, decrypt_page_token
|
||||||
|
@ -42,7 +42,8 @@ api = ApiExceptionHandlingApi()
|
||||||
api.init_app(api_bp)
|
api.init_app(api_bp)
|
||||||
api.decorators = [csrf_protect(),
|
api.decorators = [csrf_protect(),
|
||||||
crossdomain(origin='*', headers=['Authorization', 'Content-Type']),
|
crossdomain(origin='*', headers=['Authorization', 'Content-Type']),
|
||||||
process_oauth, time_decorator(api_bp.name, metric_queue)]
|
process_oauth, time_decorator(api_bp.name, metric_queue),
|
||||||
|
require_xhr_from_browser]
|
||||||
|
|
||||||
|
|
||||||
def resource(*urls, **kwargs):
|
def resource(*urls, **kwargs):
|
||||||
|
|
|
@ -1,5 +1,7 @@
|
||||||
""" Various decorators for endpoint and API handlers. """
|
""" Various decorators for endpoint and API handlers. """
|
||||||
|
|
||||||
|
import logging
|
||||||
|
|
||||||
from functools import wraps
|
from functools import wraps
|
||||||
from flask import abort, request, make_response
|
from flask import abort, request, make_response
|
||||||
|
|
||||||
|
@ -8,6 +10,9 @@ import features
|
||||||
from app import app
|
from app import app
|
||||||
from auth.auth_context import get_authenticated_context
|
from auth.auth_context import get_authenticated_context
|
||||||
from util.names import parse_namespace_repository
|
from util.names import parse_namespace_repository
|
||||||
|
from util.http import abort
|
||||||
|
|
||||||
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
def parse_repository_name(include_tag=False,
|
def parse_repository_name(include_tag=False,
|
||||||
|
@ -92,3 +97,22 @@ def route_show_if(value):
|
||||||
return f(*args, **kwargs)
|
return f(*args, **kwargs)
|
||||||
return decorated_function
|
return decorated_function
|
||||||
return decorator
|
return decorator
|
||||||
|
|
||||||
|
|
||||||
|
def require_xhr_from_browser(func):
|
||||||
|
""" Requires that API GET calls made from browsers are made via XHR, in order to prevent
|
||||||
|
reflected text attacks.
|
||||||
|
"""
|
||||||
|
|
||||||
|
@wraps(func)
|
||||||
|
def wrapper(*args, **kwargs):
|
||||||
|
if app.config.get('BROWSER_API_CALLS_XHR_ONLY', False):
|
||||||
|
if request.method == 'GET' and request.user_agent.browser:
|
||||||
|
has_xhr_header = request.headers.get('X-Requested-With') == 'XMLHttpRequest'
|
||||||
|
if not has_xhr_header:
|
||||||
|
logger.warning('Disallowed possible RTA to URL %s with user agent %s',
|
||||||
|
request.path, request.user_agent)
|
||||||
|
abort(400)
|
||||||
|
|
||||||
|
return func(*args, **kwargs)
|
||||||
|
return wrapper
|
||||||
|
|
35
endpoints/test/test_decorators.py
Normal file
35
endpoints/test/test_decorators.py
Normal file
|
@ -0,0 +1,35 @@
|
||||||
|
from data import model
|
||||||
|
from endpoints.api import api
|
||||||
|
from endpoints.api.repository import Repository
|
||||||
|
from endpoints.test.shared import conduct_call
|
||||||
|
from test.fixtures import *
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.parametrize('user_agent, include_header, expected_code', [
|
||||||
|
('curl/whatever', True, 200),
|
||||||
|
('curl/whatever', False, 200),
|
||||||
|
|
||||||
|
('Mozilla/whatever', True, 200),
|
||||||
|
('Mozilla/5.0', True, 200),
|
||||||
|
('Mozilla/5.0 (Windows NT 5.1; Win64; x64)', False, 400),
|
||||||
|
])
|
||||||
|
def test_require_xhr_from_browser(user_agent, include_header, expected_code, app, client):
|
||||||
|
# Create a public repo with a dot in its name.
|
||||||
|
user = model.user.get_user('devtable')
|
||||||
|
model.repository.create_repository('devtable', 'somerepo.bat', user, 'public')
|
||||||
|
|
||||||
|
# Retrieve the repository and ensure we either allow it through or fail, depending on the
|
||||||
|
# user agent and header.
|
||||||
|
params = {
|
||||||
|
'repository': 'devtable/somerepo.bat'
|
||||||
|
}
|
||||||
|
|
||||||
|
headers = {
|
||||||
|
'User-Agent': user_agent,
|
||||||
|
}
|
||||||
|
|
||||||
|
if include_header:
|
||||||
|
headers['X-Requested-With'] = 'XMLHttpRequest'
|
||||||
|
|
||||||
|
conduct_call(client, Repository, api.url_for, 'GET', params, headers=headers,
|
||||||
|
expected_code=expected_code)
|
|
@ -11,6 +11,7 @@ provideRun.$inject = [
|
||||||
'PlanService',
|
'PlanService',
|
||||||
'$http',
|
'$http',
|
||||||
'CookieService',
|
'CookieService',
|
||||||
|
'UserService',
|
||||||
'Features',
|
'Features',
|
||||||
'$anchorScroll',
|
'$anchorScroll',
|
||||||
'MetaService',
|
'MetaService',
|
||||||
|
@ -20,6 +21,7 @@ export function provideRun($rootScope: QuayRunScope,
|
||||||
planService: any,
|
planService: any,
|
||||||
$http: ng.IHttpService,
|
$http: ng.IHttpService,
|
||||||
cookieService: any,
|
cookieService: any,
|
||||||
|
userService: any,
|
||||||
features: any,
|
features: any,
|
||||||
$anchorScroll: ng.IAnchorScrollService,
|
$anchorScroll: ng.IAnchorScrollService,
|
||||||
metaService: any): void {
|
metaService: any): void {
|
||||||
|
@ -29,6 +31,8 @@ export function provideRun($rootScope: QuayRunScope,
|
||||||
restangular.setDefaultRequestParams(['post', 'put', 'remove', 'delete'],
|
restangular.setDefaultRequestParams(['post', 'put', 'remove', 'delete'],
|
||||||
{'_csrf_token': (<any>window).__token || ''});
|
{'_csrf_token': (<any>window).__token || ''});
|
||||||
|
|
||||||
|
restangular.setDefaultHeaders({'X-Requested-With': 'XMLHttpRequest'});
|
||||||
|
|
||||||
// Handle session expiration.
|
// Handle session expiration.
|
||||||
restangular.setErrorInterceptor(function(response) {
|
restangular.setErrorInterceptor(function(response) {
|
||||||
if (response !== undefined && response.status == 503) {
|
if (response !== undefined && response.status == 503) {
|
||||||
|
@ -120,6 +124,9 @@ export function provideRun($rootScope: QuayRunScope,
|
||||||
}
|
}
|
||||||
return $http.pendingRequests.length > 0;
|
return $http.pendingRequests.length > 0;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
// Load the inital user information.
|
||||||
|
userService.load();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -251,8 +251,5 @@ function(ApiService, CookieService, $rootScope, Config, $location, $timeout) {
|
||||||
// Update the user in the root scope.
|
// Update the user in the root scope.
|
||||||
userService.updateUserIn($rootScope);
|
userService.updateUserIn($rootScope);
|
||||||
|
|
||||||
// Load the user the first time.
|
|
||||||
userService.load();
|
|
||||||
|
|
||||||
return userService;
|
return userService;
|
||||||
}]);
|
}]);
|
||||||
|
|
|
@ -785,6 +785,13 @@ class V2RegistryLoginMixin(object):
|
||||||
|
|
||||||
|
|
||||||
class RegistryTestsMixin(object):
|
class RegistryTestsMixin(object):
|
||||||
|
def test_previously_bad_repo_name(self):
|
||||||
|
# Push a new repository with two layers.
|
||||||
|
self.do_push('public', 'foo.bar', 'public', 'password')
|
||||||
|
|
||||||
|
# Pull the repository to verify.
|
||||||
|
self.do_pull('public', 'foo.bar', 'public', 'password')
|
||||||
|
|
||||||
def test_application_repo(self):
|
def test_application_repo(self):
|
||||||
# Create an application repository via the API.
|
# Create an application repository via the API.
|
||||||
self.conduct_api_login('devtable', 'password')
|
self.conduct_api_login('devtable', 'password')
|
||||||
|
|
|
@ -2241,7 +2241,7 @@ class TestGetRepository(ApiTestCase):
|
||||||
def test_getrepo_badnames(self):
|
def test_getrepo_badnames(self):
|
||||||
self.login(ADMIN_ACCESS_USER)
|
self.login(ADMIN_ACCESS_USER)
|
||||||
|
|
||||||
bad_names = ['logs', 'build', 'tokens', 'foo-bar', 'foo_bar']
|
bad_names = ['logs', 'build', 'tokens', 'foo.bar', 'foo-bar', 'foo_bar']
|
||||||
|
|
||||||
# For each bad name, create the repo.
|
# For each bad name, create the repo.
|
||||||
for bad_name in bad_names:
|
for bad_name in bad_names:
|
||||||
|
|
|
@ -591,6 +591,11 @@ CONFIG_SCHEMA = {
|
||||||
'not authenticated as a superuser',
|
'not authenticated as a superuser',
|
||||||
'x-example': 'somesecrethere',
|
'x-example': 'somesecrethere',
|
||||||
},
|
},
|
||||||
|
'BROWSER_API_CALLS_XHR_ONLY': {
|
||||||
|
'type': 'boolean',
|
||||||
|
'description': 'If enabled, only API calls marked as being made by an XHR will be allowed from browsers. Defaults to True.',
|
||||||
|
'x-example': False,
|
||||||
|
},
|
||||||
|
|
||||||
# Time machine and tag expiration settings.
|
# Time machine and tag expiration settings.
|
||||||
'FEATURE_CHANGE_TAG_EXPIRATION': {
|
'FEATURE_CHANGE_TAG_EXPIRATION': {
|
||||||
|
|
Reference in a new issue