mirror of
https://github.com/oauth2-proxy/oauth2-proxy.git
synced 2025-04-23 12:18:50 +02:00
Ensure decrypted user/email are valid UTF8
This commit is contained in:
parent
2c851fcd4f
commit
808084b744
@ -55,6 +55,7 @@
|
|||||||
|
|
||||||
## Changes since v5.1.1
|
## Changes since v5.1.1
|
||||||
|
|
||||||
|
- [#601](https://github.com/oauth2-proxy/oauth2-proxy/pull/601) Ensure decrypted user/email are valid UTF8 (@JoelSpeed)
|
||||||
- [#560](https://github.com/oauth2-proxy/oauth2-proxy/pull/560) Fallback to UserInfo is User ID claim not present (@JoelSpeed)
|
- [#560](https://github.com/oauth2-proxy/oauth2-proxy/pull/560) Fallback to UserInfo is User ID claim not present (@JoelSpeed)
|
||||||
- [#598](https://github.com/oauth2-proxy/oauth2-proxy/pull/598) acr_values no longer sent to IdP when empty (@ScottGuymer)
|
- [#598](https://github.com/oauth2-proxy/oauth2-proxy/pull/598) acr_values no longer sent to IdP when empty (@ScottGuymer)
|
||||||
- [#548](https://github.com/oauth2-proxy/oauth2-proxy/pull/548) Separate logging options out of main options structure (@JoelSpeed)
|
- [#548](https://github.com/oauth2-proxy/oauth2-proxy/pull/548) Separate logging options out of main options structure (@JoelSpeed)
|
||||||
|
@ -2,8 +2,10 @@ package sessions
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"time"
|
"time"
|
||||||
|
"unicode/utf8"
|
||||||
|
|
||||||
"github.com/oauth2-proxy/oauth2-proxy/pkg/encryption"
|
"github.com/oauth2-proxy/oauth2-proxy/pkg/encryption"
|
||||||
)
|
)
|
||||||
@ -106,6 +108,9 @@ func DecodeSessionState(v string, c *encryption.Cipher) (*SessionState, error) {
|
|||||||
if ss.Email != "" {
|
if ss.Email != "" {
|
||||||
decryptedEmail, errEmail := c.Decrypt(ss.Email)
|
decryptedEmail, errEmail := c.Decrypt(ss.Email)
|
||||||
if errEmail == nil {
|
if errEmail == nil {
|
||||||
|
if !utf8.ValidString(decryptedEmail) {
|
||||||
|
return nil, errors.New("invalid value for decrypted email")
|
||||||
|
}
|
||||||
ss.Email = decryptedEmail
|
ss.Email = decryptedEmail
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -113,6 +118,9 @@ func DecodeSessionState(v string, c *encryption.Cipher) (*SessionState, error) {
|
|||||||
if ss.User != "" {
|
if ss.User != "" {
|
||||||
decryptedUser, errUser := c.Decrypt(ss.User)
|
decryptedUser, errUser := c.Decrypt(ss.User)
|
||||||
if errUser == nil {
|
if errUser == nil {
|
||||||
|
if !utf8.ValidString(decryptedUser) {
|
||||||
|
return nil, errors.New("invalid value for decrypted user")
|
||||||
|
}
|
||||||
ss.User = decryptedUser
|
ss.User = decryptedUser
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -49,15 +49,7 @@ func TestSessionStateSerialization(t *testing.T) {
|
|||||||
// ensure a different cipher can't decode properly (ie: it gets gibberish)
|
// ensure a different cipher can't decode properly (ie: it gets gibberish)
|
||||||
ss, err = sessions.DecodeSessionState(encoded, c2)
|
ss, err = sessions.DecodeSessionState(encoded, c2)
|
||||||
t.Logf("%#v", ss)
|
t.Logf("%#v", ss)
|
||||||
assert.Equal(t, nil, err)
|
assert.NotEqual(t, nil, err)
|
||||||
assert.NotEqual(t, "user@domain.com", ss.User)
|
|
||||||
assert.NotEqual(t, s.Email, ss.Email)
|
|
||||||
assert.NotEqual(t, s.PreferredUsername, ss.PreferredUsername)
|
|
||||||
assert.Equal(t, s.CreatedAt.Unix(), ss.CreatedAt.Unix())
|
|
||||||
assert.Equal(t, s.ExpiresOn.Unix(), ss.ExpiresOn.Unix())
|
|
||||||
assert.NotEqual(t, s.AccessToken, ss.AccessToken)
|
|
||||||
assert.NotEqual(t, s.IDToken, ss.IDToken)
|
|
||||||
assert.NotEqual(t, s.RefreshToken, ss.RefreshToken)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestSessionStateSerializationWithUser(t *testing.T) {
|
func TestSessionStateSerializationWithUser(t *testing.T) {
|
||||||
@ -91,14 +83,7 @@ func TestSessionStateSerializationWithUser(t *testing.T) {
|
|||||||
// ensure a different cipher can't decode properly (ie: it gets gibberish)
|
// ensure a different cipher can't decode properly (ie: it gets gibberish)
|
||||||
ss, err = sessions.DecodeSessionState(encoded, c2)
|
ss, err = sessions.DecodeSessionState(encoded, c2)
|
||||||
t.Logf("%#v", ss)
|
t.Logf("%#v", ss)
|
||||||
assert.Equal(t, nil, err)
|
assert.NotEqual(t, nil, err)
|
||||||
assert.NotEqual(t, s.User, ss.User)
|
|
||||||
assert.NotEqual(t, s.Email, ss.Email)
|
|
||||||
assert.NotEqual(t, s.PreferredUsername, ss.PreferredUsername)
|
|
||||||
assert.Equal(t, s.CreatedAt.Unix(), ss.CreatedAt.Unix())
|
|
||||||
assert.Equal(t, s.ExpiresOn.Unix(), ss.ExpiresOn.Unix())
|
|
||||||
assert.NotEqual(t, s.AccessToken, ss.AccessToken)
|
|
||||||
assert.NotEqual(t, s.RefreshToken, ss.RefreshToken)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestSessionStateSerializationNoCipher(t *testing.T) {
|
func TestSessionStateSerializationNoCipher(t *testing.T) {
|
||||||
@ -278,6 +263,14 @@ func TestDecodeSessionState(t *testing.T) {
|
|||||||
Cipher: c,
|
Cipher: c,
|
||||||
Error: true,
|
Error: true,
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
SessionState: sessions.SessionState{
|
||||||
|
Email: "user@domain.com",
|
||||||
|
User: "YmFzZTY0LWVuY29kZWQtdXNlcgo=", // Base64 encoding of base64-encoded-user
|
||||||
|
},
|
||||||
|
Error: true,
|
||||||
|
Cipher: c,
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
|
Loading…
x
Reference in New Issue
Block a user