You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@ofbiz.apache.org by jl...@apache.org on 2021/10/10 06:35:47 UTC

[ofbiz-framework] branch release17.12 updated (7db83d6 -> b6257b7)

This is an automated email from the ASF dual-hosted git repository.

jleroux pushed a change to branch release17.12
in repository https://gitbox.apache.org/repos/asf/ofbiz-framework.git.


    from 7db83d6  Improved: post-auth Remote Code Execution Vulnerability (OFBIZ-12332)
     new fb49563  Fixed: post-auth Remote Code Execution Vulnerability (OFBIZ-12332)
     new b6257b7  Fixed: post-auth Remote Code Execution Vulnerability (OFBIZ-12332)

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .../org/apache/ofbiz/base/util/CacheFilter.java    | 115 +++++++++++++
 .../org/apache/ofbiz/base/util/RequestWrapper.java | 184 +++++++++++++++++++++
 framework/service/testdef/servicetests.xml         |   7 +-
 .../apache/ofbiz/webapp/control/ContextFilter.java |   8 -
 framework/webtools/webapp/webtools/WEB-INF/web.xml |   9 +
 5 files changed, 311 insertions(+), 12 deletions(-)
 create mode 100644 framework/base/src/main/java/org/apache/ofbiz/base/util/CacheFilter.java
 create mode 100644 framework/base/src/main/java/org/apache/ofbiz/base/util/RequestWrapper.java

[ofbiz-framework] 01/02: Fixed: post-auth Remote Code Execution Vulnerability (OFBIZ-12332)

Posted by jl...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

jleroux pushed a commit to branch release17.12
in repository https://gitbox.apache.org/repos/asf/ofbiz-framework.git

commit fb495637441cfe331943d34ce2d0943bc8c30552
Author: Jacques Le Roux <ja...@les7arts.com>
AuthorDate: Sat Oct 9 19:25:33 2021 +0200

    Fixed: post-auth Remote Code Execution Vulnerability (OFBIZ-12332)
    
    This definitely solves all issues by introducing a CacheFilter and
    RequestWrapper classes inspired by several works found on the Net.
    Also moves the change introduced before in ContextFilter to CacheFilter.
    
    The basic problem is that you only can use once
    ServletRequest::getInputStream or the ServletRequest::getReader
    Also not both, even once, ie they can be seen as same from this POV.
    
    The integration tests all pass.
    
    Also replace the checked String "</serializable>" by "</serializable" as, like
    reported by Jie Zhu, the former could be bypassed by using "</serializable >"
    
    Thanks: Jie Zhu for report
    
    Conflicts: ContextFilter.java handled by hand
---
 .../org/apache/ofbiz/base/util/CacheFilter.java    |  69 +++++++++
 .../org/apache/ofbiz/base/util/RequestWrapper.java | 172 +++++++++++++++++++++
 framework/service/testdef/servicetests.xml         |   7 +-
 .../apache/ofbiz/webapp/control/ContextFilter.java |   8 -
 framework/webtools/webapp/webtools/WEB-INF/web.xml |   9 ++
 5 files changed, 253 insertions(+), 12 deletions(-)

diff --git a/framework/base/src/main/java/org/apache/ofbiz/base/util/CacheFilter.java b/framework/base/src/main/java/org/apache/ofbiz/base/util/CacheFilter.java
new file mode 100644
index 0000000..95f87f0
--- /dev/null
+++ b/framework/base/src/main/java/org/apache/ofbiz/base/util/CacheFilter.java
@@ -0,0 +1,69 @@
+/*******************************************************************************
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ *******************************************************************************/
+package org.apache.ofbiz.base.util;
+
+import java.io.IOException;
+import java.util.stream.Collectors;
+
+import javax.servlet.Filter;
+import javax.servlet.FilterChain;
+import javax.servlet.FilterConfig;
+import javax.servlet.ServletException;
+import javax.servlet.ServletRequest;
+import javax.servlet.ServletResponse;
+import javax.servlet.http.HttpServletRequest;
+
+public class CacheFilter implements Filter {
+
+    private FilterConfig filterConfig = null;
+
+    public void doFilter(ServletRequest request, ServletResponse response, FilterChain chain) throws IOException, ServletException {
+        // Read request.getBody() as many time you need
+        request = new RequestWrapper((HttpServletRequest) request);
+        String body = request.getReader().lines().collect(Collectors.joining());
+        if (body.contains("</serializable")) {
+            Debug.logError("Content not authorised for security reason", "CacheFilter"); // Cf. OFBIZ-12332
+            return;
+        }
+        chain.doFilter(request, response);
+    }
+
+    public void init(FilterConfig filterConfiguration) throws ServletException {
+        setFilterConfig(filterConfiguration);
+    }
+
+    public void destroy() {
+        setFilterConfig(null);
+    }
+
+    /**
+     * @return the filterConfig
+     */
+    public FilterConfig getFilterConfig() {
+        return filterConfig;
+    }
+
+    /**
+     * @param filterConfig the filterConfig to set
+     */
+    public void setFilterConfig(FilterConfig filterConfig) {
+        this.filterConfig = filterConfig;
+    }
+
+}
diff --git a/framework/base/src/main/java/org/apache/ofbiz/base/util/RequestWrapper.java b/framework/base/src/main/java/org/apache/ofbiz/base/util/RequestWrapper.java
new file mode 100644
index 0000000..67ac1fe
--- /dev/null
+++ b/framework/base/src/main/java/org/apache/ofbiz/base/util/RequestWrapper.java
@@ -0,0 +1,172 @@
+/*******************************************************************************
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ *******************************************************************************/
+package org.apache.ofbiz.base.util;
+
+import java.io.BufferedReader;
+import java.io.ByteArrayInputStream;
+import java.io.ByteArrayOutputStream;
+import java.io.IOException;
+import java.io.InputStream;
+import java.io.InputStreamReader;
+import java.util.Collections;
+import java.util.Enumeration;
+import java.util.HashMap;
+import java.util.Map;
+
+import javax.servlet.ReadListener;
+import javax.servlet.ServletInputStream;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletRequestWrapper;
+
+public class RequestWrapper extends HttpServletRequestWrapper {
+
+    private static final int INITIAL_BUFFER_SIZE = 1024;
+    private HttpServletRequest origRequest;
+    private byte[] reqBytes;
+    private boolean firstTime = true;
+    private Map<String, String[]> parameterMap = null;
+
+    public RequestWrapper(HttpServletRequest arg0) {
+        super(arg0);
+        origRequest = arg0;
+    }
+
+    public BufferedReader getReader() throws IOException {
+
+        getBytes();
+
+        InputStreamReader dave = new InputStreamReader(new ByteArrayInputStream(reqBytes));
+        BufferedReader br = new BufferedReader(dave);
+        return br;
+
+    }
+
+    public ServletInputStream getInputStream() throws IOException {
+
+        getBytes();
+
+        ServletInputStream sis = new ServletInputStream() {
+            private int numberOfBytesAlreadyRead;
+
+            @Override
+            public int read() throws IOException {
+                byte b;
+                if (reqBytes.length > numberOfBytesAlreadyRead) {
+                    b = reqBytes[numberOfBytesAlreadyRead++];
+                } else {
+                    b = -1;
+                }
+
+                return b;
+            }
+
+            @Override
+            public int read(byte[] b, int off, int len) throws IOException {
+                if (len > (reqBytes.length - numberOfBytesAlreadyRead)) {
+                    len = reqBytes.length - numberOfBytesAlreadyRead;
+                }
+                if (len <= 0) {
+                    return -1;
+                }
+                System.arraycopy(reqBytes, numberOfBytesAlreadyRead, b, off, len);
+                numberOfBytesAlreadyRead += len;
+                return len;
+            }
+
+            @Override
+            public boolean isFinished() {
+                // TODO Auto-generated method stub
+                return false;
+            }
+
+            @Override
+            public boolean isReady() {
+                // TODO Auto-generated method stub
+                return false;
+            }
+
+            @Override
+            public void setReadListener(ReadListener listener) {
+                // TODO Auto-generated method stub
+
+            }
+
+        };
+
+        return sis;
+    }
+
+    public byte[] getBytes() throws IOException {
+        if (firstTime) {
+            firstTime = false;
+            // Read the parameters first, because they can get reachless after the inputStream is read.
+            getParameterMap();
+            int initialSize = origRequest.getContentLength();
+            if (initialSize < INITIAL_BUFFER_SIZE) {
+                initialSize = INITIAL_BUFFER_SIZE;
+            }
+            ByteArrayOutputStream baos = new ByteArrayOutputStream(initialSize);
+            byte[] buf = new byte[1024];
+            InputStream is = origRequest.getInputStream();
+            int len = 0;
+            while (len >= 0) {
+                len = is.read(buf);
+                if (len > 0) {
+                    baos.write(buf, 0, len);
+                }
+            }
+            reqBytes = baos.toByteArray();
+        }
+        return reqBytes;
+    }
+
+    @Override
+    public String getParameter(String name) {
+        parameterMap = UtilMisc.toMap(getParameterMap());
+        if (parameterMap != null) {
+            String[] a = parameterMap.get(name);
+            if (a == null || a.length == 0) {
+                return null;
+            }
+            return a[0];
+        }
+        return null;
+    }
+
+    @Override
+    public Map<String, String[]> getParameterMap() {
+        if (parameterMap == null) {
+            parameterMap = new HashMap<String, String[]>();
+            parameterMap.putAll(super.getParameterMap());
+        }
+        return parameterMap;
+    }
+
+    @SuppressWarnings("unchecked")
+    @Override
+    public Enumeration getParameterNames() {
+        return Collections.enumeration(parameterMap.values());
+    }
+
+    @Override
+    public String[] getParameterValues(String name) {
+        return parameterMap.get(name);
+    }
+
+}
diff --git a/framework/service/testdef/servicetests.xml b/framework/service/testdef/servicetests.xml
index 0c6d20c..3fb82fb 100644
--- a/framework/service/testdef/servicetests.xml
+++ b/framework/service/testdef/servicetests.xml
@@ -66,14 +66,13 @@ under the License.
     <test-case case-name="service-eca-global-event-exec-assert-data">
         <entity-xml action="assert" entity-xml-url="component://service/testdef/data/ServiceEcaGlobalEventAssertData.xml"/>
     </test-case>
-
-<!-- Because of "post-auth Remote Code Execution Vulnerability" (OFBIZ-12332), Temporarily comments out XMLRPC tests. -->
-<!--     <test-case case-name="service-xml-rpc">
+    
+    <test-case case-name="service-xml-rpc">
         <junit-test-suite class-name="org.apache.ofbiz.service.test.XmlRpcTests"/>
     </test-case>
     <test-case case-name="service-xml-rpc-local-engine">
         <service-test service-name="testXmlRpcClientAdd"/>
-    </test-case> -->
+    </test-case>
     <test-case case-name="load-data-service-permission-tests">
         <entity-xml entity-xml-url="component://service/testdef/data/PermissionServiceTestData.xml"/>
     </test-case>
diff --git a/framework/webapp/src/main/java/org/apache/ofbiz/webapp/control/ContextFilter.java b/framework/webapp/src/main/java/org/apache/ofbiz/webapp/control/ContextFilter.java
index 6edd2aa..fbbfb87 100644
--- a/framework/webapp/src/main/java/org/apache/ofbiz/webapp/control/ContextFilter.java
+++ b/framework/webapp/src/main/java/org/apache/ofbiz/webapp/control/ContextFilter.java
@@ -20,7 +20,6 @@ package org.apache.ofbiz.webapp.control;
 
 import java.io.IOException;
 import java.util.Enumeration;
-import java.util.stream.Collectors;
 
 import javax.servlet.Filter;
 import javax.servlet.FilterChain;
@@ -95,13 +94,6 @@ public class ContextFilter implements Filter {
         HttpServletRequest httpRequest = (HttpServletRequest) request;
         HttpServletResponse httpResponse = (HttpServletResponse) response;
 
-        String body = request.getReader().lines().collect(Collectors.joining());
-        if (body.contains("</serializable>")) {
-            Debug.logError("Content not authorised for security reason", module); // Cf. OFBIZ-12332
-            return;
-        }
-
-
         // ----- Servlet Object Setup -----
 
         // set the ServletContext in the request for future use
diff --git a/framework/webtools/webapp/webtools/WEB-INF/web.xml b/framework/webtools/webapp/webtools/WEB-INF/web.xml
index 0f6a3d5..3109316 100644
--- a/framework/webtools/webapp/webtools/WEB-INF/web.xml
+++ b/framework/webtools/webapp/webtools/WEB-INF/web.xml
@@ -59,6 +59,11 @@ under the License.
         </init-param>
     </filter>
     <filter>
+        <display-name>CacheFilter</display-name>
+        <filter-name>CacheFilter</filter-name>
+        <filter-class>org.apache.ofbiz.base.util.CacheFilter</filter-class>
+    </filter>
+    <filter>
         <display-name>ContextFilter</display-name>
         <filter-name>ContextFilter</filter-name>
         <filter-class>org.apache.ofbiz.webapp.control.ContextFilter</filter-class>
@@ -73,6 +78,10 @@ under the License.
         <url-pattern>/*</url-pattern>
     </filter-mapping>
     <filter-mapping>
+        <filter-name>CacheFilter</filter-name>
+        <url-pattern>/*</url-pattern>
+    </filter-mapping>
+    <filter-mapping>
         <filter-name>ContextFilter</filter-name>
         <url-pattern>/*</url-pattern>
     </filter-mapping>

[ofbiz-framework] 02/02: Fixed: post-auth Remote Code Execution Vulnerability (OFBIZ-12332)

Posted by jl...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

jleroux pushed a commit to branch release17.12
in repository https://gitbox.apache.org/repos/asf/ofbiz-framework.git

commit b6257b720ba276306c6f7a96aa324fa5ce383391
Author: Jacques Le Roux <ja...@les7arts.com>
AuthorDate: Sat Oct 9 19:25:33 2021 +0200

    Fixed: post-auth Remote Code Execution Vulnerability (OFBIZ-12332)
    
    This definitely solves all issues by introducing a CacheFilter and
    RequestWrapper classes inspired by several works found on the Net.
    Also moves the change introduced before in ContextFilter to CacheFilter.
    
    The basic problem is that you only can use once
    ServletRequest::getInputStream or the ServletRequest::getReader
    Also not both, even once, ie they can be seen as same from this POV.
    
    The integration tests all pass.
    
    Also replace the checked String "</serializable>" by "</serializable" as, like
    reported by Jie Zhu, the former could be bypassed by using "</serializable >"
    
    Thanks: Jie Zhu for report
    
    # Conflicts handled by hand
      CacheFilter.java
      RequestWrapper.java
---
 .../org/apache/ofbiz/base/util/CacheFilter.java    | 58 +++++++++++++++++++---
 .../org/apache/ofbiz/base/util/RequestWrapper.java | 32 ++++++++----
 2 files changed, 74 insertions(+), 16 deletions(-)

diff --git a/framework/base/src/main/java/org/apache/ofbiz/base/util/CacheFilter.java b/framework/base/src/main/java/org/apache/ofbiz/base/util/CacheFilter.java
index 95f87f0..de15e3f 100644
--- a/framework/base/src/main/java/org/apache/ofbiz/base/util/CacheFilter.java
+++ b/framework/base/src/main/java/org/apache/ofbiz/base/util/CacheFilter.java
@@ -33,21 +33,67 @@ public class CacheFilter implements Filter {
 
     private FilterConfig filterConfig = null;
 
+    /**
+     * The <code>doFilter</code> method of the Filter is called by the container each time a request/response pair is passed through the chain due to
+     * a client request for a resource at the end of the chain. The FilterChain passed in to this method allows the Filter to pass on the request and
+     * response to the next entity in the chain.
+     * <p>
+     * A typical implementation of this method would follow the following pattern:- <br>
+     * 1. Examine the request<br>
+     * 2. Optionally wrap the request object with a custom implementation to filter content or headers for input filtering <br>
+     * 3. Optionally wrap the response object with a custom implementation to filter content or headers for output filtering <br>
+     * 4. a) <strong>Either</strong> invoke the next entity in the chain using the FilterChain object (<code>chain.doFilter()</code>), <br>
+     * 4. b) <strong>or</strong> not pass on the request/response pair to the next entity in the filter chain to block the request processing<br>
+     * 5. Directly set headers on the response after invocation of the next entity in the filter chain.
+     * @param request The request to process
+     * @param response The response associated with the request
+     * @param chain Provides access to the next filter in the chain for this filter to pass the request and response to for further processing
+     * @throws IOException if an I/O error occurs during this filter's processing of the request
+     * @throws ServletException if the processing fails for any other reason
+     */
     public void doFilter(ServletRequest request, ServletResponse response, FilterChain chain) throws IOException, ServletException {
-        // Read request.getBody() as many time you need
-        request = new RequestWrapper((HttpServletRequest) request);
-        String body = request.getReader().lines().collect(Collectors.joining());
-        if (body.contains("</serializable")) {
-            Debug.logError("Content not authorised for security reason", "CacheFilter"); // Cf. OFBIZ-12332
-            return;
+        // Get the request URI without the webapp mount point.
+        String context = ((HttpServletRequest) request).getContextPath();
+        String uriWithContext = ((HttpServletRequest) request).getRequestURI();
+        String uri = uriWithContext.substring(context.length());
+
+        if ("xmlrpc".equals(uri.toLowerCase())) {
+            // Read request.getReader() as many time you need
+            request = new RequestWrapper((HttpServletRequest) request);
+            String body = request.getReader().lines().collect(Collectors.joining());
+            if (body.contains("</serializable")) {
+                Debug.logError("Content not authorised for security reason", "CacheFilter"); // Cf. OFBIZ-12332
+                return;
+            }
         }
         chain.doFilter(request, response);
     }
 
+    /**
+     * Called by the web container to indicate to a filter that it is being placed into service. The servlet container calls the init method exactly
+     * once after instantiating the filter. The init method must complete successfully before the filter is asked to do any filtering work.
+     * <p>
+     * The web container cannot place the filter into service if the init method either:
+     * <ul>
+     * <li>Throws a ServletException</li>
+     * <li>Does not return within a time period defined by the web container</li>
+     * </ul>
+     * The default implementation is a NO-OP.
+     * @param filterConfig The configuration information associated with the filter instance being initialised
+     * @throws ServletException if the initialisation fails
+     */
     public void init(FilterConfig filterConfiguration) throws ServletException {
         setFilterConfig(filterConfiguration);
     }
 
+    /**
+     * Called by the web container to indicate to a filter that it is being taken out of service. This method is only called once all threads within
+     * the filter's doFilter method have exited or after a timeout period has passed. After the web container calls this method, it will not call the
+     * doFilter method again on this instance of the filter. <br>
+     * <br>
+     * This method gives the filter an opportunity to clean up any resources that are being held (for example, memory, file handles, threads) and make
+     * sure that any persistent state is synchronized with the filter's current state in memory. The default implementation is a NO-OP.
+     */
     public void destroy() {
         setFilterConfig(null);
     }
diff --git a/framework/base/src/main/java/org/apache/ofbiz/base/util/RequestWrapper.java b/framework/base/src/main/java/org/apache/ofbiz/base/util/RequestWrapper.java
index 67ac1fe..70ca6af 100644
--- a/framework/base/src/main/java/org/apache/ofbiz/base/util/RequestWrapper.java
+++ b/framework/base/src/main/java/org/apache/ofbiz/base/util/RequestWrapper.java
@@ -42,11 +42,14 @@ public class RequestWrapper extends HttpServletRequestWrapper {
     private boolean firstTime = true;
     private Map<String, String[]> parameterMap = null;
 
-    public RequestWrapper(HttpServletRequest arg0) {
-        super(arg0);
-        origRequest = arg0;
+    public RequestWrapper(HttpServletRequest arg) {
+        super(arg);
+        origRequest = arg;
     }
 
+    /**
+     * The default behavior of this method is to return getReader() on the wrapped request object.
+     */
     public BufferedReader getReader() throws IOException {
 
         getBytes();
@@ -54,9 +57,11 @@ public class RequestWrapper extends HttpServletRequestWrapper {
         InputStreamReader dave = new InputStreamReader(new ByteArrayInputStream(reqBytes));
         BufferedReader br = new BufferedReader(dave);
         return br;
-
     }
 
+    /**
+     * The default behavior of this method is to return getInputStream() on the wrapped request object.
+     */
     public ServletInputStream getInputStream() throws IOException {
 
         getBytes();
@@ -72,7 +77,6 @@ public class RequestWrapper extends HttpServletRequestWrapper {
                 } else {
                     b = -1;
                 }
-
                 return b;
             }
 
@@ -89,22 +93,27 @@ public class RequestWrapper extends HttpServletRequestWrapper {
                 return len;
             }
 
+            /**
+             * Needed by Servlet 3.1 No worry this is not used in OFBiz code
+             */
             @Override
             public boolean isFinished() {
-                // TODO Auto-generated method stub
                 return false;
             }
 
+            /**
+             * Needed by Servlet 3.1 No worry this is not used in OFBiz code
+             */
             @Override
             public boolean isReady() {
-                // TODO Auto-generated method stub
                 return false;
             }
 
+            /**
+             * Needed by Servlet 3.1 No worry this is not used in OFBiz code
+             */
             @Override
             public void setReadListener(ReadListener listener) {
-                // TODO Auto-generated method stub
-
             }
 
         };
@@ -112,10 +121,13 @@ public class RequestWrapper extends HttpServletRequestWrapper {
         return sis;
     }
 
+    /**
+     * Returns the bytes taken from the original request getInputStream
+     */
     public byte[] getBytes() throws IOException {
         if (firstTime) {
             firstTime = false;
-            // Read the parameters first, because they can get reachless after the inputStream is read.
+            // Read the parameters first, because they can't be reached after the inputStream is read.
             getParameterMap();
             int initialSize = origRequest.getContentLength();
             if (initialSize < INITIAL_BUFFER_SIZE) {