mirror of
https://github.com/navidrome/navidrome.git
synced 2025-04-03 20:47:35 +03:00
sec(subsonic): authentication bypass in Subsonic API with non-existent username
Signed-off-by: Deluan <deluan@navidrome.org>
This commit is contained in:
parent
70487a09f4
commit
09ae41a2da
4 changed files with 157 additions and 28 deletions
|
@ -50,14 +50,20 @@ func (r *userRepository) Get(id string) (*model.User, error) {
|
||||||
sel := r.newSelect().Columns("*").Where(Eq{"id": id})
|
sel := r.newSelect().Columns("*").Where(Eq{"id": id})
|
||||||
var res model.User
|
var res model.User
|
||||||
err := r.queryOne(sel, &res)
|
err := r.queryOne(sel, &res)
|
||||||
return &res, err
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &res, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *userRepository) GetAll(options ...model.QueryOptions) (model.Users, error) {
|
func (r *userRepository) GetAll(options ...model.QueryOptions) (model.Users, error) {
|
||||||
sel := r.newSelect(options...).Columns("*")
|
sel := r.newSelect(options...).Columns("*")
|
||||||
res := model.Users{}
|
res := model.Users{}
|
||||||
err := r.queryAll(sel, &res)
|
err := r.queryAll(sel, &res)
|
||||||
return res, err
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return res, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *userRepository) Put(u *model.User) error {
|
func (r *userRepository) Put(u *model.User) error {
|
||||||
|
@ -91,22 +97,29 @@ func (r *userRepository) FindFirstAdmin() (*model.User, error) {
|
||||||
sel := r.newSelect(model.QueryOptions{Sort: "updated_at", Max: 1}).Columns("*").Where(Eq{"is_admin": true})
|
sel := r.newSelect(model.QueryOptions{Sort: "updated_at", Max: 1}).Columns("*").Where(Eq{"is_admin": true})
|
||||||
var usr model.User
|
var usr model.User
|
||||||
err := r.queryOne(sel, &usr)
|
err := r.queryOne(sel, &usr)
|
||||||
return &usr, err
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &usr, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *userRepository) FindByUsername(username string) (*model.User, error) {
|
func (r *userRepository) FindByUsername(username string) (*model.User, error) {
|
||||||
sel := r.newSelect().Columns("*").Where(Expr("user_name = ? COLLATE NOCASE", username))
|
sel := r.newSelect().Columns("*").Where(Expr("user_name = ? COLLATE NOCASE", username))
|
||||||
var usr model.User
|
var usr model.User
|
||||||
err := r.queryOne(sel, &usr)
|
err := r.queryOne(sel, &usr)
|
||||||
return &usr, err
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &usr, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *userRepository) FindByUsernameWithPassword(username string) (*model.User, error) {
|
func (r *userRepository) FindByUsernameWithPassword(username string) (*model.User, error) {
|
||||||
usr, err := r.FindByUsername(username)
|
usr, err := r.FindByUsername(username)
|
||||||
if err == nil {
|
if err != nil {
|
||||||
_ = r.decryptPassword(usr)
|
return nil, err
|
||||||
}
|
}
|
||||||
return usr, err
|
_ = r.decryptPassword(usr)
|
||||||
|
return usr, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *userRepository) UpdateLastLoginAt(id string) error {
|
func (r *userRepository) UpdateLastLoginAt(id string) error {
|
||||||
|
|
|
@ -343,7 +343,6 @@ func validateIPAgainstList(ip string, comaSeparatedList string) bool {
|
||||||
}
|
}
|
||||||
|
|
||||||
testedIP, _, err := net.ParseCIDR(fmt.Sprintf("%s/32", ip))
|
testedIP, _, err := net.ParseCIDR(fmt.Sprintf("%s/32", ip))
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
|
@ -111,15 +111,16 @@ func authenticate(ds model.DataStore) func(next http.Handler) http.Handler {
|
||||||
log.Debug(ctx, "API: Request canceled when authenticating", "auth", "subsonic", "username", username, "remoteAddr", r.RemoteAddr, err)
|
log.Debug(ctx, "API: Request canceled when authenticating", "auth", "subsonic", "username", username, "remoteAddr", r.RemoteAddr, err)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
if errors.Is(err, model.ErrNotFound) {
|
switch {
|
||||||
|
case errors.Is(err, model.ErrNotFound):
|
||||||
log.Warn(ctx, "API: Invalid login", "auth", "subsonic", "username", username, "remoteAddr", r.RemoteAddr, err)
|
log.Warn(ctx, "API: Invalid login", "auth", "subsonic", "username", username, "remoteAddr", r.RemoteAddr, err)
|
||||||
} else if err != nil {
|
case err != nil:
|
||||||
log.Error(ctx, "API: Error authenticating username", "auth", "subsonic", "username", username, "remoteAddr", r.RemoteAddr, err)
|
log.Error(ctx, "API: Error authenticating username", "auth", "subsonic", "username", username, "remoteAddr", r.RemoteAddr, err)
|
||||||
}
|
default:
|
||||||
|
err = validateCredentials(usr, pass, token, salt, jwt)
|
||||||
err = validateCredentials(usr, pass, token, salt, jwt)
|
if err != nil {
|
||||||
if err != nil {
|
log.Warn(ctx, "API: Invalid login", "auth", "subsonic", "username", username, "remoteAddr", r.RemoteAddr, err)
|
||||||
log.Warn(ctx, "API: Invalid login", "auth", "subsonic", "username", username, "remoteAddr", r.RemoteAddr, err)
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -2,13 +2,16 @@ package subsonic
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"crypto/md5"
|
||||||
"errors"
|
"errors"
|
||||||
|
"fmt"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/http/httptest"
|
"net/http/httptest"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/navidrome/navidrome/conf"
|
"github.com/navidrome/navidrome/conf"
|
||||||
|
"github.com/navidrome/navidrome/conf/configtest"
|
||||||
"github.com/navidrome/navidrome/consts"
|
"github.com/navidrome/navidrome/consts"
|
||||||
"github.com/navidrome/navidrome/core"
|
"github.com/navidrome/navidrome/core"
|
||||||
"github.com/navidrome/navidrome/core/auth"
|
"github.com/navidrome/navidrome/core/auth"
|
||||||
|
@ -149,23 +152,134 @@ var _ = Describe("Middlewares", func() {
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
It("passes authentication with correct credentials", func() {
|
When("using password authentication", func() {
|
||||||
r := newGetRequest("u=admin", "p=wordpass")
|
It("passes authentication with correct credentials", func() {
|
||||||
cp := authenticate(ds)(next)
|
r := newGetRequest("u=admin", "p=wordpass")
|
||||||
cp.ServeHTTP(w, r)
|
cp := authenticate(ds)(next)
|
||||||
|
cp.ServeHTTP(w, r)
|
||||||
|
|
||||||
Expect(next.called).To(BeTrue())
|
Expect(next.called).To(BeTrue())
|
||||||
user, _ := request.UserFrom(next.req.Context())
|
user, _ := request.UserFrom(next.req.Context())
|
||||||
Expect(user.UserName).To(Equal("admin"))
|
Expect(user.UserName).To(Equal("admin"))
|
||||||
|
})
|
||||||
|
|
||||||
|
It("fails authentication with invalid user", func() {
|
||||||
|
r := newGetRequest("u=invalid", "p=wordpass")
|
||||||
|
cp := authenticate(ds)(next)
|
||||||
|
cp.ServeHTTP(w, r)
|
||||||
|
|
||||||
|
Expect(w.Body.String()).To(ContainSubstring(`code="40"`))
|
||||||
|
Expect(next.called).To(BeFalse())
|
||||||
|
})
|
||||||
|
|
||||||
|
It("fails authentication with invalid password", func() {
|
||||||
|
r := newGetRequest("u=admin", "p=INVALID")
|
||||||
|
cp := authenticate(ds)(next)
|
||||||
|
cp.ServeHTTP(w, r)
|
||||||
|
|
||||||
|
Expect(w.Body.String()).To(ContainSubstring(`code="40"`))
|
||||||
|
Expect(next.called).To(BeFalse())
|
||||||
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
It("fails authentication with wrong password", func() {
|
When("using token authentication", func() {
|
||||||
r := newGetRequest("u=invalid", "", "", "")
|
var salt = "12345"
|
||||||
cp := authenticate(ds)(next)
|
|
||||||
cp.ServeHTTP(w, r)
|
|
||||||
|
|
||||||
Expect(w.Body.String()).To(ContainSubstring(`code="40"`))
|
It("passes authentication with correct token", func() {
|
||||||
Expect(next.called).To(BeFalse())
|
token := fmt.Sprintf("%x", md5.Sum([]byte("wordpass"+salt)))
|
||||||
|
r := newGetRequest("u=admin", "t="+token, "s="+salt)
|
||||||
|
cp := authenticate(ds)(next)
|
||||||
|
cp.ServeHTTP(w, r)
|
||||||
|
|
||||||
|
Expect(next.called).To(BeTrue())
|
||||||
|
user, _ := request.UserFrom(next.req.Context())
|
||||||
|
Expect(user.UserName).To(Equal("admin"))
|
||||||
|
})
|
||||||
|
|
||||||
|
It("fails authentication with invalid token", func() {
|
||||||
|
r := newGetRequest("u=admin", "t=INVALID", "s="+salt)
|
||||||
|
cp := authenticate(ds)(next)
|
||||||
|
cp.ServeHTTP(w, r)
|
||||||
|
|
||||||
|
Expect(w.Body.String()).To(ContainSubstring(`code="40"`))
|
||||||
|
Expect(next.called).To(BeFalse())
|
||||||
|
})
|
||||||
|
|
||||||
|
It("fails authentication with empty password", func() {
|
||||||
|
// Token generated with random Salt, empty password
|
||||||
|
token := fmt.Sprintf("%x", md5.Sum([]byte(""+salt)))
|
||||||
|
r := newGetRequest("u=NON_EXISTENT_USER", "t="+token, "s="+salt)
|
||||||
|
cp := authenticate(ds)(next)
|
||||||
|
cp.ServeHTTP(w, r)
|
||||||
|
|
||||||
|
Expect(w.Body.String()).To(ContainSubstring(`code="40"`))
|
||||||
|
Expect(next.called).To(BeFalse())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
When("using JWT authentication", func() {
|
||||||
|
var validToken string
|
||||||
|
|
||||||
|
BeforeEach(func() {
|
||||||
|
DeferCleanup(configtest.SetupConfig())
|
||||||
|
conf.Server.SessionTimeout = time.Minute
|
||||||
|
auth.Init(ds)
|
||||||
|
})
|
||||||
|
|
||||||
|
It("passes authentication with correct token", func() {
|
||||||
|
usr := &model.User{UserName: "admin"}
|
||||||
|
var err error
|
||||||
|
validToken, err = auth.CreateToken(usr)
|
||||||
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
|
r := newGetRequest("u=admin", "jwt="+validToken)
|
||||||
|
cp := authenticate(ds)(next)
|
||||||
|
cp.ServeHTTP(w, r)
|
||||||
|
|
||||||
|
Expect(next.called).To(BeTrue())
|
||||||
|
user, _ := request.UserFrom(next.req.Context())
|
||||||
|
Expect(user.UserName).To(Equal("admin"))
|
||||||
|
})
|
||||||
|
|
||||||
|
It("fails authentication with invalid token", func() {
|
||||||
|
r := newGetRequest("u=admin", "jwt=INVALID_TOKEN")
|
||||||
|
cp := authenticate(ds)(next)
|
||||||
|
cp.ServeHTTP(w, r)
|
||||||
|
|
||||||
|
Expect(w.Body.String()).To(ContainSubstring(`code="40"`))
|
||||||
|
Expect(next.called).To(BeFalse())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
When("using reverse proxy authentication", func() {
|
||||||
|
BeforeEach(func() {
|
||||||
|
DeferCleanup(configtest.SetupConfig())
|
||||||
|
conf.Server.ReverseProxyWhitelist = "192.168.1.1/24"
|
||||||
|
conf.Server.ReverseProxyUserHeader = "Remote-User"
|
||||||
|
})
|
||||||
|
|
||||||
|
It("passes authentication with correct IP and header", func() {
|
||||||
|
r := newGetRequest("u=admin")
|
||||||
|
r.Header.Add("Remote-User", "admin")
|
||||||
|
r = r.WithContext(request.WithReverseProxyIp(r.Context(), "192.168.1.1"))
|
||||||
|
cp := authenticate(ds)(next)
|
||||||
|
cp.ServeHTTP(w, r)
|
||||||
|
|
||||||
|
Expect(next.called).To(BeTrue())
|
||||||
|
user, _ := request.UserFrom(next.req.Context())
|
||||||
|
Expect(user.UserName).To(Equal("admin"))
|
||||||
|
})
|
||||||
|
|
||||||
|
It("fails authentication with wrong IP", func() {
|
||||||
|
r := newGetRequest("u=admin")
|
||||||
|
r.Header.Add("Remote-User", "admin")
|
||||||
|
r = r.WithContext(request.WithReverseProxyIp(r.Context(), "192.168.2.1"))
|
||||||
|
cp := authenticate(ds)(next)
|
||||||
|
cp.ServeHTTP(w, r)
|
||||||
|
|
||||||
|
Expect(w.Body.String()).To(ContainSubstring(`code="40"`))
|
||||||
|
Expect(next.called).To(BeFalse())
|
||||||
|
})
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -341,6 +455,8 @@ type mockHandler struct {
|
||||||
func (mh *mockHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
func (mh *mockHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||||
mh.req = r
|
mh.req = r
|
||||||
mh.called = true
|
mh.called = true
|
||||||
|
w.WriteHeader(http.StatusOK)
|
||||||
|
_, _ = w.Write([]byte("OK"))
|
||||||
}
|
}
|
||||||
|
|
||||||
type mockPlayers struct {
|
type mockPlayers struct {
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue