debian-mirror-gitlab/lib/gitlab/url_blocker.rb

214 lines
7 KiB
Ruby
Raw Normal View History

2018-12-05 23:21:45 +05:30
# frozen_string_literal: true
2017-08-17 22:00:37 +05:30
require 'resolv'
2018-11-29 20:51:05 +05:30
require 'ipaddress'
2017-08-17 22:00:37 +05:30
module Gitlab
class UrlBlocker
2018-05-09 12:01:36 +05:30
BlockedUrlError = Class.new(StandardError)
2017-08-17 22:00:37 +05:30
2018-05-09 12:01:36 +05:30
class << self
2019-06-05 12:25:43 +05:30
# Validates the given url according to the constraints specified by arguments.
#
# ports - Raises error if the given URL port does is not between given ports.
# allow_localhost - Raises error if URL resolves to a localhost IP address and argument is true.
# allow_local_network - Raises error if URL resolves to a link-local address and argument is true.
# ascii_only - Raises error if URL has unicode characters and argument is true.
# enforce_user - Raises error if URL user doesn't start with alphanumeric characters and argument is true.
# enforce_sanitization - Raises error if URL includes any HTML/CSS/JS tags and argument is true.
#
# Returns an array with [<uri>, <original-hostname>].
# rubocop:disable Metrics/CyclomaticComplexity
# rubocop:disable Metrics/ParameterLists
def validate!(
url,
ports: [],
protocols: [],
allow_localhost: false,
allow_local_network: true,
ascii_only: false,
enforce_user: false,
enforce_sanitization: false,
dns_rebind_protection: true)
# rubocop:enable Metrics/CyclomaticComplexity
# rubocop:enable Metrics/ParameterLists
return [nil, nil] if url.nil?
2017-08-17 22:00:37 +05:30
2018-11-29 20:51:05 +05:30
# Param url can be a string, URI or Addressable::URI
uri = parse_url(url)
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
validate_html_tags!(uri) if enforce_sanitization
2019-06-05 12:25:43 +05:30
hostname = uri.hostname
2019-02-15 15:39:39 +05:30
port = get_port(uri)
2019-06-05 12:25:43 +05:30
unless internal?(uri)
validate_protocol!(uri.scheme, protocols)
validate_port!(port, ports) if ports.any?
validate_user!(uri.user) if enforce_user
validate_hostname!(hostname)
validate_unicode_restriction!(uri) if ascii_only
end
2018-03-26 14:24:53 +05:30
2018-05-09 12:01:36 +05:30
begin
2019-06-05 12:25:43 +05:30
addrs_info = Addrinfo.getaddrinfo(hostname, port, nil, :STREAM).map do |addr|
2018-11-29 20:51:05 +05:30
addr.ipv6_v4mapped? ? addr.ipv6_to_ipv4 : addr
end
2018-03-17 18:26:18 +05:30
rescue SocketError
2019-06-05 12:25:43 +05:30
return [uri, nil]
2017-08-17 22:00:37 +05:30
end
2019-06-05 12:25:43 +05:30
protected_uri_with_hostname = enforce_uri_hostname(addrs_info, uri, hostname, dns_rebind_protection)
# Allow url from the GitLab instance itself but only for the configured hostname and ports
return protected_uri_with_hostname if internal?(uri)
2018-05-09 12:01:36 +05:30
validate_localhost!(addrs_info) unless allow_localhost
2018-11-08 19:23:39 +05:30
validate_loopback!(addrs_info) unless allow_localhost
2018-05-09 12:01:36 +05:30
validate_local_network!(addrs_info) unless allow_local_network
2018-11-08 19:23:39 +05:30
validate_link_local!(addrs_info) unless allow_local_network
2018-05-09 12:01:36 +05:30
2019-06-05 12:25:43 +05:30
protected_uri_with_hostname
2018-05-09 12:01:36 +05:30
end
def blocked_url?(*args)
validate!(*args)
2017-08-17 22:00:37 +05:30
false
2018-05-09 12:01:36 +05:30
rescue BlockedUrlError
true
2017-08-17 22:00:37 +05:30
end
private
2019-06-05 12:25:43 +05:30
# Returns the given URI with IP address as hostname and the original hostname respectively
# in an Array.
#
# It checks whether the resolved IP address matches with the hostname. If not, it changes
# the hostname to the resolved IP address.
#
# The original hostname is used to validate the SSL, given in that scenario
# we'll be making the request to the IP address, instead of using the hostname.
def enforce_uri_hostname(addrs_info, uri, hostname, dns_rebind_protection)
address = addrs_info.first
ip_address = address&.ip_address
return [uri, nil] unless dns_rebind_protection && ip_address && ip_address != hostname
uri = uri.dup
uri.hostname = ip_address
[uri, hostname]
end
2019-02-15 15:39:39 +05:30
def get_port(uri)
uri.port || uri.default_port
end
def validate_html_tags!(uri)
uri_str = uri.to_s
sanitized_uri = ActionController::Base.helpers.sanitize(uri_str, tags: [])
if sanitized_uri != uri_str
raise BlockedUrlError, 'HTML/CSS/JS tags are not allowed'
end
end
2018-11-29 20:51:05 +05:30
def parse_url(url)
raise Addressable::URI::InvalidURIError if multiline?(url)
Addressable::URI.parse(url)
rescue Addressable::URI::InvalidURIError, URI::InvalidURIError
raise BlockedUrlError, 'URI is invalid'
end
def multiline?(url)
CGI.unescape(url.to_s) =~ /\n|\r/
end
2018-11-08 19:23:39 +05:30
def validate_port!(port, ports)
2018-05-09 12:01:36 +05:30
return if port.blank?
# Only ports under 1024 are restricted
return if port >= 1024
2018-11-08 19:23:39 +05:30
return if ports.include?(port)
2017-08-17 22:00:37 +05:30
2018-11-08 19:23:39 +05:30
raise BlockedUrlError, "Only allowed ports are #{ports.join(', ')}, and any over 1024"
end
def validate_protocol!(protocol, protocols)
if protocol.blank? || (protocols.any? && !protocols.include?(protocol))
raise BlockedUrlError, "Only allowed protocols are #{protocols.join(', ')}"
end
2017-08-17 22:00:37 +05:30
end
2018-05-09 12:01:36 +05:30
def validate_user!(value)
return if value.blank?
return if value =~ /\A\p{Alnum}/
2017-08-17 22:00:37 +05:30
2018-05-09 12:01:36 +05:30
raise BlockedUrlError, "Username needs to start with an alphanumeric character"
end
def validate_hostname!(value)
return if value.blank?
2018-11-29 20:51:05 +05:30
return if IPAddress.valid?(value)
2018-05-09 12:01:36 +05:30
return if value =~ /\A\p{Alnum}/
2018-11-29 20:51:05 +05:30
raise BlockedUrlError, "Hostname or IP address invalid"
2018-05-09 12:01:36 +05:30
end
2019-02-15 15:39:39 +05:30
def validate_unicode_restriction!(uri)
return if uri.to_s.ascii_only?
raise BlockedUrlError, "URI must be ascii only #{uri.to_s.dump}"
end
2018-05-09 12:01:36 +05:30
def validate_localhost!(addrs_info)
2018-11-29 20:51:05 +05:30
local_ips = ["::", "0.0.0.0"]
2018-05-09 12:01:36 +05:30
local_ips.concat(Socket.ip_address_list.map(&:ip_address))
return if (local_ips & addrs_info.map(&:ip_address)).empty?
raise BlockedUrlError, "Requests to localhost are not allowed"
end
2018-11-08 19:23:39 +05:30
def validate_loopback!(addrs_info)
return unless addrs_info.any? { |addr| addr.ipv4_loopback? || addr.ipv6_loopback? }
raise BlockedUrlError, "Requests to loopback addresses are not allowed"
end
2018-05-09 12:01:36 +05:30
def validate_local_network!(addrs_info)
2018-11-29 20:51:05 +05:30
return unless addrs_info.any? { |addr| addr.ipv4_private? || addr.ipv6_sitelocal? || addr.ipv6_unique_local? }
2018-05-09 12:01:36 +05:30
raise BlockedUrlError, "Requests to the local network are not allowed"
2017-08-17 22:00:37 +05:30
end
2018-11-08 19:23:39 +05:30
def validate_link_local!(addrs_info)
netmask = IPAddr.new('169.254.0.0/16')
return unless addrs_info.any? { |addr| addr.ipv6_linklocal? || netmask.include?(addr.ip_address) }
raise BlockedUrlError, "Requests to the link local network are not allowed"
end
2017-08-17 22:00:37 +05:30
def internal?(uri)
internal_web?(uri) || internal_shell?(uri)
end
def internal_web?(uri)
2018-11-29 20:51:05 +05:30
uri.scheme == config.gitlab.protocol &&
uri.hostname == config.gitlab.host &&
2017-08-17 22:00:37 +05:30
(uri.port.blank? || uri.port == config.gitlab.port)
end
def internal_shell?(uri)
2018-11-29 20:51:05 +05:30
uri.scheme == 'ssh' &&
uri.hostname == config.gitlab_shell.ssh_host &&
2017-08-17 22:00:37 +05:30
(uri.port.blank? || uri.port == config.gitlab_shell.ssh_port)
end
def config
Gitlab.config
end
end
end
end