Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
13f0d481
Commit
13f0d481
authored
May 26, 2020
by
GitLab Bot
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Add latest changes from gitlab-org/security/gitlab@13-0-stable-ee
parent
581d2902
Changes
5
Hide whitespace changes
Inline
Side-by-side
Showing
5 changed files
with
59 additions
and
3 deletions
+59
-3
changelogs/unreleased/216528-confidential-issue.yml
changelogs/unreleased/216528-confidential-issue.yml
+5
-0
lib/gitlab/static_site_editor/config.rb
lib/gitlab/static_site_editor/config.rb
+5
-1
lib/gitlab/url_sanitizer.rb
lib/gitlab/url_sanitizer.rb
+7
-2
spec/lib/gitlab/static_site_editor/config_spec.rb
spec/lib/gitlab/static_site_editor/config_spec.rb
+18
-0
spec/lib/gitlab/url_sanitizer_spec.rb
spec/lib/gitlab/url_sanitizer_spec.rb
+24
-0
No files found.
changelogs/unreleased/216528-confidential-issue.yml
0 → 100644
View file @
13f0d481
---
title
:
Add an extra validation to Static Site Editor payload
merge_request
:
author
:
type
:
security
lib/gitlab/static_site_editor/config.rb
View file @
13f0d481
...
...
@@ -21,7 +21,7 @@ module Gitlab
project_id:
project
.
id
,
project:
project
.
path
,
namespace:
project
.
namespace
.
path
,
return_url:
return_url
,
return_url:
sanitize_url
(
return_url
)
,
is_supported_content:
supported_content?
.
to_s
,
base_url:
Gitlab
::
Routing
.
url_helpers
.
project_show_sse_path
(
project
,
full_path
)
}
...
...
@@ -52,6 +52,10 @@ module Gitlab
def
full_path
"
#{
ref
}
/
#{
file_path
}
"
end
def
sanitize_url
(
url
)
url
if
Gitlab
::
UrlSanitizer
.
valid_web?
(
url
)
end
end
end
end
lib/gitlab/url_sanitizer.rb
View file @
13f0d481
...
...
@@ -3,6 +3,7 @@
module
Gitlab
class
UrlSanitizer
ALLOWED_SCHEMES
=
%w[http https ssh git]
.
freeze
ALLOWED_WEB_SCHEMES
=
%w[http https]
.
freeze
def
self
.
sanitize
(
content
)
regexp
=
URI
::
DEFAULT_PARSER
.
make_regexp
(
ALLOWED_SCHEMES
)
...
...
@@ -12,17 +13,21 @@ module Gitlab
content
.
gsub
(
regexp
,
''
)
end
def
self
.
valid?
(
url
)
def
self
.
valid?
(
url
,
allowed_schemes:
ALLOWED_SCHEMES
)
return
false
unless
url
.
present?
return
false
unless
url
.
is_a?
(
String
)
uri
=
Addressable
::
URI
.
parse
(
url
.
strip
)
ALLOWED_SCHEMES
.
include?
(
uri
.
scheme
)
allowed_schemes
.
include?
(
uri
.
scheme
)
rescue
Addressable
::
URI
::
InvalidURIError
false
end
def
self
.
valid_web?
(
url
)
valid?
(
url
,
allowed_schemes:
ALLOWED_WEB_SCHEMES
)
end
def
initialize
(
url
,
credentials:
nil
)
%i[user password]
.
each
do
|
symbol
|
credentials
[
symbol
]
=
credentials
[
symbol
].
presence
if
credentials
&
.
key?
(
symbol
)
...
...
spec/lib/gitlab/static_site_editor/config_spec.rb
View file @
13f0d481
...
...
@@ -65,5 +65,23 @@ describe Gitlab::StaticSiteEditor::Config do
it
{
is_expected
.
to
include
(
is_supported_content:
'false'
)
}
end
context
'when return_url is not a valid URL'
do
let
(
:return_url
)
{
'example.com'
}
it
{
is_expected
.
to
include
(
return_url:
nil
)
}
end
context
'when return_url has a javascript scheme'
do
let
(
:return_url
)
{
'javascript:alert(document.domain)'
}
it
{
is_expected
.
to
include
(
return_url:
nil
)
}
end
context
'when return_url is missing'
do
let
(
:return_url
)
{
nil
}
it
{
is_expected
.
to
include
(
return_url:
nil
)
}
end
end
end
spec/lib/gitlab/url_sanitizer_spec.rb
View file @
13f0d481
...
...
@@ -60,6 +60,30 @@ describe Gitlab::UrlSanitizer do
end
end
describe
'.valid_web?'
do
where
(
:value
,
:url
)
do
false
|
nil
false
|
''
false
|
'123://invalid:url'
false
|
'valid@project:url.git'
false
|
'valid:pass@project:url.git'
false
|
%w(test array)
false
|
'ssh://example.com'
false
|
'ssh://:@example.com'
false
|
'ssh://foo@example.com'
false
|
'ssh://foo:bar@example.com'
false
|
'ssh://foo:bar@example.com/group/group/project.git'
false
|
'git://example.com/group/group/project.git'
false
|
'git://foo:bar@example.com/group/group/project.git'
true
|
'http://foo:bar@example.com/group/group/project.git'
true
|
'https://foo:bar@example.com/group/group/project.git'
end
with_them
do
it
{
expect
(
described_class
.
valid_web?
(
url
)).
to
eq
(
value
)
}
end
end
describe
'#sanitized_url'
do
context
'credentials in hash'
do
where
(
username:
[
'foo'
,
''
,
nil
],
password:
[
'bar'
,
''
,
nil
])
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment