From b6c8f060962ebf244594de2e108b3cbd6d0a69d0 Mon Sep 17 00:00:00 2001 From: Jack Grigg Date: Sun, 17 Nov 2024 23:57:56 +0000 Subject: [PATCH 1/3] Add tests for invalid plugin name chars --- age/src/plugin.rs | 62 +++++++++++++++++++ .../file.age.txt | 8 +++ .../rage/decrypt-invalid-identity-chars.toml | 13 ++++ .../decrypt-invalid-plugin-name-chars.toml | 12 ++++ .../rage/encrypt-invalid-recipient-chars.toml | 11 ++++ 5 files changed, 106 insertions(+) create mode 100644 rage/tests/cmd/rage/decrypt-invalid-identity-chars.in/file.age.txt create mode 100644 rage/tests/cmd/rage/decrypt-invalid-identity-chars.toml create mode 100644 rage/tests/cmd/rage/decrypt-invalid-plugin-name-chars.toml create mode 100644 rage/tests/cmd/rage/encrypt-invalid-recipient-chars.toml diff --git a/age/src/plugin.rs b/age/src/plugin.rs index 97a1465..387bf9f 100644 --- a/age/src/plugin.rs +++ b/age/src/plugin.rs @@ -461,3 +461,65 @@ impl crate::Identity for IdentityPluginV1 { self.unwrap_stanzas(stanzas.iter()) } } + +#[cfg(test)] +mod tests { + use crate::{Callbacks, DecryptError, EncryptError}; + + use super::{ + Identity, IdentityPluginV1, Recipient, RecipientPluginV1, PLUGIN_IDENTITY_PREFIX, + PLUGIN_RECIPIENT_PREFIX, + }; + + const INVALID_PLUGIN_NAME: &str = "foobar/../../../../../../../usr/bin/echo"; + + struct NoCallbacks; + impl Callbacks for NoCallbacks { + fn prompt(&self, _: &str) {} + fn request_public_string(&self, _: &str) -> Option { + None + } + fn request_passphrase(&self, _: &str) -> Option { + None + } + } + + #[test] + fn recipient_rejects_invalid_chars() { + let invalid_recipient = bech32::encode( + &format!("{}{}", PLUGIN_RECIPIENT_PREFIX, INVALID_PLUGIN_NAME), + [], + bech32::Variant::Bech32, + ) + .unwrap(); + assert!(invalid_recipient.parse::().is_err()); + } + + #[test] + fn identity_rejects_invalid_chars() { + let invalid_identity = bech32::encode( + &format!("{}{}-", PLUGIN_IDENTITY_PREFIX, INVALID_PLUGIN_NAME), + [], + bech32::Variant::Bech32, + ) + .expect("HRP is valid") + .to_uppercase(); + assert!(invalid_identity.parse::().is_err()); + } + + #[test] + fn recipient_plugin_v1_rejects_invalid_chars() { + assert!(matches!( + RecipientPluginV1::new(INVALID_PLUGIN_NAME, &[], &[], NoCallbacks), + Err(EncryptError::MissingPlugin { binary_name }) if binary_name == INVALID_PLUGIN_NAME, + )); + } + + #[test] + fn identity_plugin_v1_rejects_invalid_chars() { + assert!(matches!( + IdentityPluginV1::new(INVALID_PLUGIN_NAME, &[], NoCallbacks), + Err(DecryptError::MissingPlugin { binary_name }) if binary_name == INVALID_PLUGIN_NAME, + )); + } +} diff --git a/rage/tests/cmd/rage/decrypt-invalid-identity-chars.in/file.age.txt b/rage/tests/cmd/rage/decrypt-invalid-identity-chars.in/file.age.txt new file mode 100644 index 0000000..6f9dc67 --- /dev/null +++ b/rage/tests/cmd/rage/decrypt-invalid-identity-chars.in/file.age.txt @@ -0,0 +1,8 @@ +-----BEGIN AGE ENCRYPTED FILE----- +YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBHUGc3Zlhpekp0K012aXdu +T1VZN0lmWlRmNjdLYVB4RldkTFVLTkNDUXlBCmJjRUcrM3E0a0U0N3IyK1JsTitG +dHVTd0N6TVFRTWgzdG5uSzJmNm9YMTgKLT4gQXQ1WWAtZ3JlYXNlIDxodGFSVHJg +IFg0cWYsO0ogZ2Fzc1EKZGtPSTB3Ci0tLSBKazRIaHJxdnNJcHpyclRkQjg3QW5r +SVE2MHdtWkErYTNrNWJibWd1bmNBCkK9FoOkiLB93gD79vNed8L3LM9rhKm5qma2 +lSiwRx/aM1DKaZO0CMmYQkoM2tPReA== +-----END AGE ENCRYPTED FILE----- diff --git a/rage/tests/cmd/rage/decrypt-invalid-identity-chars.toml b/rage/tests/cmd/rage/decrypt-invalid-identity-chars.toml new file mode 100644 index 0000000..d3350d2 --- /dev/null +++ b/rage/tests/cmd/rage/decrypt-invalid-identity-chars.toml @@ -0,0 +1,13 @@ +bin.name = "rage" +args = "--decrypt --identity - file.age.txt" +status = "failed" +stdin = """ +AGE-PLUGIN-FOOBAR/../../../../../../../USR/BIN/ECHO-1HKGPY3 +""" +stdout = "" +stderr = """ +Error: identity file contains non-identity data on line 1 + +[ Did rage not do what you expected? Could an error be more useful? ] +[ Tell us: https://str4d.xyz/rage/report ] +""" diff --git a/rage/tests/cmd/rage/decrypt-invalid-plugin-name-chars.toml b/rage/tests/cmd/rage/decrypt-invalid-plugin-name-chars.toml new file mode 100644 index 0000000..968a8b2 --- /dev/null +++ b/rage/tests/cmd/rage/decrypt-invalid-plugin-name-chars.toml @@ -0,0 +1,12 @@ +bin.name = "rage" +args = "--decrypt -j foobar/../../../../../../../usr/bin/echo" +status = "failed" +stdin = "" +stdout = "" +stderr = """ +Error: Could not find 'foobar/../../../../../../../usr/bin/echo' on the PATH. +Have you installed the plugin? + +[ Did rage not do what you expected? Could an error be more useful? ] +[ Tell us: https://str4d.xyz/rage/report ] +""" diff --git a/rage/tests/cmd/rage/encrypt-invalid-recipient-chars.toml b/rage/tests/cmd/rage/encrypt-invalid-recipient-chars.toml new file mode 100644 index 0000000..ce03d5e --- /dev/null +++ b/rage/tests/cmd/rage/encrypt-invalid-recipient-chars.toml @@ -0,0 +1,11 @@ +bin.name = "rage" +args = "--encrypt --recipient age1foobar/../../../../../../../usr/bin/echo1849l6e" +status = "failed" +stdin = "" +stdout = "" +stderr = """ +Error: Invalid recipient 'age1foobar/../../../../../../../usr/bin/echo1849l6e'. + +[ Did rage not do what you expected? Could an error be more useful? ] +[ Tell us: https://str4d.xyz/rage/report ] +""" From 703152ecfa86f27952a35b57dd525ed39396a227 Mon Sep 17 00:00:00 2001 From: Jack Grigg Date: Mon, 18 Nov 2024 00:29:11 +0000 Subject: [PATCH 2/3] Restrict set of valid characters for plugin names Previously, plugin names were allowed to be `1*VCHAR`, which permits path separators and parent directory syntax. Under certain conditions, this could cause `rage` to execute a different binary than intended when launching a plugin. Plugin names are now restricted to alphanumeric characters or +-._ which covers all binary names generally observed in practice. --- age/CHANGELOG.md | 6 +++ age/src/plugin.rs | 104 +++++++++++++++++++++++++++++----------------- rage/CHANGELOG.md | 6 +++ 3 files changed, 79 insertions(+), 37 deletions(-) diff --git a/age/CHANGELOG.md b/age/CHANGELOG.md index 2543e30..2c22bea 100644 --- a/age/CHANGELOG.md +++ b/age/CHANGELOG.md @@ -9,6 +9,12 @@ and this project adheres to Rust's notion of to 1.0.0 are beta releases. ## [Unreleased] +### Security +- The age plugin protocol previously allowed plugin names that could be + interpreted as file paths. Under certain conditions, this could lead to a + different binary being executed as an age plugin than intended. Plugin names + are now required to only contain alphanumeric characters or the four special + characters `+-._`. ## [0.6.0] - 2021-05-02 ### Security diff --git a/age/src/plugin.rs b/age/src/plugin.rs index 387bf9f..494f593 100644 --- a/age/src/plugin.rs +++ b/age/src/plugin.rs @@ -29,6 +29,13 @@ const CMD_REQUEST_PUBLIC: &str = "request-public"; const CMD_REQUEST_SECRET: &str = "request-secret"; const CMD_FILE_KEY: &str = "file-key"; +#[inline] +fn valid_plugin_name(plugin_name: &str) -> bool { + plugin_name + .bytes() + .all(|b| b.is_ascii_alphanumeric() | matches!(b, b'+' | b'-' | b'.' | b'_')) +} + fn binary_name(plugin_name: &str) -> String { format!("age-plugin-{}", plugin_name) } @@ -53,10 +60,15 @@ impl std::str::FromStr for Recipient { if hrp.len() > PLUGIN_RECIPIENT_PREFIX.len() && hrp.starts_with(PLUGIN_RECIPIENT_PREFIX) { - Ok(Recipient { - name: hrp.split_at(PLUGIN_RECIPIENT_PREFIX.len()).1.to_owned(), - recipient: s.to_owned(), - }) + let name = hrp.split_at(PLUGIN_RECIPIENT_PREFIX.len()).1.to_owned(); + if valid_plugin_name(&name) { + Ok(Recipient { + name, + recipient: s.to_owned(), + }) + } else { + Err("invalid plugin name") + } } else { Err("invalid HRP") } @@ -97,14 +109,20 @@ impl std::str::FromStr for Identity { if hrp.len() > PLUGIN_IDENTITY_PREFIX.len() && hrp.starts_with(PLUGIN_IDENTITY_PREFIX) { - Ok(Identity { - name: hrp - .split_at(PLUGIN_IDENTITY_PREFIX.len()) - .1 - .trim_end_matches('-') - .to_owned(), - identity: s.to_owned(), - }) + // TODO: Decide whether to allow plugin names to end in - + let name = hrp + .split_at(PLUGIN_IDENTITY_PREFIX.len()) + .1 + .trim_end_matches('-') + .to_owned(); + if valid_plugin_name(&name) { + Ok(Identity { + name, + identity: s.to_owned(), + }) + } else { + Err("invalid plugin name") + } } else { Err("invalid HRP") } @@ -178,22 +196,28 @@ impl RecipientPluginV1 { identities: &[Identity], callbacks: C, ) -> Result { - Plugin::new(plugin_name) - .map_err(|binary_name| EncryptError::MissingPlugin { binary_name }) - .map(|plugin| RecipientPluginV1 { - plugin, - recipients: recipients - .iter() - .filter(|r| r.name == plugin_name) - .cloned() - .collect(), - identities: identities - .iter() - .filter(|r| r.name == plugin_name) - .cloned() - .collect(), - callbacks, + if valid_plugin_name(plugin_name) { + Plugin::new(plugin_name) + .map_err(|binary_name| EncryptError::MissingPlugin { binary_name }) + .map(|plugin| RecipientPluginV1 { + plugin, + recipients: recipients + .iter() + .filter(|r| r.name == plugin_name) + .cloned() + .collect(), + identities: identities + .iter() + .filter(|r| r.name == plugin_name) + .cloned() + .collect(), + callbacks, + }) + } else { + Err(EncryptError::MissingPlugin { + binary_name: plugin_name.to_string(), }) + } } } @@ -344,17 +368,23 @@ impl IdentityPluginV1 { identities: &[Identity], callbacks: C, ) -> Result { - Plugin::new(plugin_name) - .map_err(|binary_name| DecryptError::MissingPlugin { binary_name }) - .map(|plugin| IdentityPluginV1 { - plugin, - identities: identities - .iter() - .filter(|r| r.name == plugin_name) - .cloned() - .collect(), - callbacks, + if valid_plugin_name(plugin_name) { + Plugin::new(plugin_name) + .map_err(|binary_name| DecryptError::MissingPlugin { binary_name }) + .map(|plugin| IdentityPluginV1 { + plugin, + identities: identities + .iter() + .filter(|r| r.name == plugin_name) + .cloned() + .collect(), + callbacks, + }) + } else { + Err(DecryptError::MissingPlugin { + binary_name: plugin_name.to_string(), }) + } } fn unwrap_stanzas<'a>( diff --git a/rage/CHANGELOG.md b/rage/CHANGELOG.md index 922666d..17879dd 100644 --- a/rage/CHANGELOG.md +++ b/rage/CHANGELOG.md @@ -9,6 +9,12 @@ and this project adheres to Rust's notion of to 1.0.0 are beta releases. ## [Unreleased] +### Security +- The age plugin protocol previously allowed plugin names that could be + interpreted as file paths. Under certain conditions, this could lead to a + different binary being executed as an age plugin than intended. Plugin names + are now required to only contain alphanumeric characters or the four special + characters `+-._`. ## [0.6.0] - 2021-05-02 ### Added From 5501bb6220baab685557112de3f4f410de7f4fc7 Mon Sep 17 00:00:00 2001 From: Jack Grigg Date: Mon, 18 Nov 2024 05:24:53 +0000 Subject: [PATCH 3/3] v0.6.1 --- Cargo.lock | 4 ++-- age/CHANGELOG.md | 2 ++ age/Cargo.toml | 2 +- rage/CHANGELOG.md | 2 ++ rage/Cargo.toml | 4 ++-- 5 files changed, 9 insertions(+), 5 deletions(-) diff --git a/Cargo.lock b/Cargo.lock index a3083d5..fa0b6f3 100644 --- a/Cargo.lock +++ b/Cargo.lock @@ -66,7 +66,7 @@ dependencies = [ [[package]] name = "age" -version = "0.6.0" +version = "0.6.1" dependencies = [ "aes", "aes-ctr", @@ -1614,7 +1614,7 @@ checksum = "941ba9d78d8e2f7ce474c015eea4d9c6d25b6a3327f9832ee29a4de27f91bbb8" [[package]] name = "rage" -version = "0.6.0" +version = "0.6.1" dependencies = [ "age", "chrono", diff --git a/age/CHANGELOG.md b/age/CHANGELOG.md index 2c22bea..0d11087 100644 --- a/age/CHANGELOG.md +++ b/age/CHANGELOG.md @@ -9,6 +9,8 @@ and this project adheres to Rust's notion of to 1.0.0 are beta releases. ## [Unreleased] + +## [0.6.1] - 2024-11-18 ### Security - The age plugin protocol previously allowed plugin names that could be interpreted as file paths. Under certain conditions, this could lead to a diff --git a/age/Cargo.toml b/age/Cargo.toml index 07e7e78..741f886 100644 --- a/age/Cargo.toml +++ b/age/Cargo.toml @@ -1,7 +1,7 @@ [package] name = "age" description = "[BETA] A simple, secure, and modern encryption library." -version = "0.6.0" +version = "0.6.1" authors = ["Jack Grigg "] repository = "https://github.com/str4d/rage" readme = "README.md" diff --git a/rage/CHANGELOG.md b/rage/CHANGELOG.md index 17879dd..5b0eba2 100644 --- a/rage/CHANGELOG.md +++ b/rage/CHANGELOG.md @@ -9,6 +9,8 @@ and this project adheres to Rust's notion of to 1.0.0 are beta releases. ## [Unreleased] + +## [0.6.1] - 2024-11-18 ### Security - The age plugin protocol previously allowed plugin names that could be interpreted as file paths. Under certain conditions, this could lead to a diff --git a/rage/Cargo.toml b/rage/Cargo.toml index bcd65b9..b385cef 100644 --- a/rage/Cargo.toml +++ b/rage/Cargo.toml @@ -1,7 +1,7 @@ [package] name = "rage" description = "[BETA] A simple, secure, and modern encryption tool." -version = "0.6.0" +version = "0.6.1" authors = ["Jack Grigg "] repository = "https://github.com/str4d/rage" readme = "../README.md" @@ -43,7 +43,7 @@ maintenance = { status = "experimental" } [dependencies] # rage and rage-keygen dependencies -age = { version = "0.6.0", path = "../age", features = ["armor", "cli-common", "plugin"] } +age = { version = "0.6.1", path = "../age", features = ["armor", "cli-common", "plugin"] } chrono = "0.4" console = "0.14" env_logger = "0.8"