Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix: disallow POST without Origin nor Referer from specific user agents #193

Merged
merged 2 commits into from
Apr 6, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
32 changes: 32 additions & 0 deletions http/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,7 @@ package http
import (
"net/http"
"net/url"
"strings"
"sync"

cors "github.com/rs/cors"
Expand Down Expand Up @@ -150,3 +151,34 @@ func allowReferer(r *http.Request, cfg *ServerConfig) bool {

return false
}

// allowUserAgent checks the request's user-agent against the list
// of DisallowUserAgents for requests with no origin nor referer set.
func allowUserAgent(r *http.Request, cfg *ServerConfig) bool {
// This check affects POST as we should never get POST requests from a
// browser without Origin or Referer, but we might:
// https://bugzilla.mozilla.org/show_bug.cgi?id=429594.
if r.Method != http.MethodPost {
return true
}

origin := r.Header.Get("Origin")
referer := r.Referer()

// If these are set, we leave up to CORS and CSRF checks.
if origin != "" || referer != "" {
return true
}

// Allow if the user agent does not start with Mozilla... (i.e. curl)
ua := r.Header.Get("User-agent")
if !strings.HasPrefix(ua, "Mozilla") {
return true
}

// Disallow otherwise.
//
// This means the request probably came from a browser and thus, it
// should have included Origin or referer headers.
return false
}
39 changes: 39 additions & 0 deletions http/errors_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -170,3 +170,42 @@ func TestUnhandledMethod(t *testing.T) {
}
tc.test(t)
}

func TestDisallowedUserAgents(t *testing.T) {
tcs := []httpTestCase{
{
// Block Mozilla* browsers that do not provide origins.
Method: "POST",
AllowGet: false,
Code: http.StatusForbidden,
ReqHeaders: map[string]string{
"User-Agent": "Mozilla/5.0 (X11; Linux x86_64; rv:10.0) Gecko/20100101 Firefox/10.0",
},
},
{
// Do not block on GETs
Method: "GET",
AllowGet: true,
Code: http.StatusOK,
ReqHeaders: map[string]string{
"User-Agent": "Mozilla/5.0 (X11; Linux x86_64; rv:10.0) Gecko/20100101 Firefox/10.0",
},
},
{
// Do not block a Mozilla* browser that provides an
// allowed Origin
Method: "POST",
AllowGet: false,
AllowOrigins: []string{"*"},
Origin: "null",
Code: http.StatusOK,
ReqHeaders: map[string]string{
"User-Agent": "Mozilla/5.0 (Linux; U; Android 4.1.1; en-gb; Build/KLP) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30",
},
},
}

for _, tc := range tcs {
tc.test(t)
}
}
2 changes: 1 addition & 1 deletion http/handler.go
Original file line number Diff line number Diff line change
Expand Up @@ -121,7 +121,7 @@ func (h *handler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
return
}

if !allowOrigin(r, h.cfg) || !allowReferer(r, h.cfg) {
if !allowOrigin(r, h.cfg) || !allowReferer(r, h.cfg) || !allowUserAgent(r, h.cfg) {
http.Error(w, "403 - Forbidden", http.StatusForbidden)
log.Warnf("API blocked request to %s. (possible CSRF)", r.URL)
return
Expand Down