request_forgery_protection.rb 16.5 KB
Newer Older
1 2 3
require "rack/session/abstract/id"
require "action_controller/metal/exceptions"
require "active_support/security_utils"
J
Jeremy Kemper 已提交
4

5
module ActionController #:nodoc:
6 7
  class InvalidAuthenticityToken < ActionControllerError #:nodoc:
  end
8

9 10 11
  class InvalidCrossOriginRequest < ActionControllerError #:nodoc:
  end

12
  # Controller actions are protected from Cross-Site Request Forgery (CSRF) attacks
H
Hendy Tanata 已提交
13
  # by including a token in the rendered HTML for your application. This token is
14
  # stored as a random string in the session, to which an attacker does not have
15
  # access. When a request reaches your application, \Rails verifies the received
16 17
  # token with the token in the session. All requests are checked except GET requests
  # as these should be idempotent. Keep in mind that all session-oriented requests
18
  # should be CSRF protected, including JavaScript and HTML requests.
19
  #
20
  # Since HTML and JavaScript requests are typically made from the browser, we
21
  # need to ensure to verify request authenticity for the web browser. We can
22
  # use session-oriented authentication for these types of requests, by using
23
  # the `protect_from_forgery` method in our controllers.
24
  #
25 26 27 28 29 30 31
  # GET requests are not protected since they don't have side effects like writing
  # to the database and don't leak sensitive information. JavaScript requests are
  # an exception: a third-party site can use a <script> tag to reference a JavaScript
  # URL on your site. When your JavaScript response loads on their site, it executes.
  # With carefully crafted JavaScript on their end, sensitive data in your JavaScript
  # response may be extracted. To prevent this, only XmlHttpRequest (known as XHR or
  # Ajax) requests are allowed to make GET requests for JavaScript responses.
V
Vijay Dev 已提交
32 33
  #
  # It's important to remember that XML or JSON requests are also affected and if
34 35
  # you're building an API you should change forgery protection method in
  # <tt>ApplicationController</tt> (by default: <tt>:exception</tt>):
36 37
  #
  #   class ApplicationController < ActionController::Base
38
  #     protect_from_forgery unless: -> { request.format.json? }
39
  #   end
40
  #
41 42
  # CSRF protection is turned on with the <tt>protect_from_forgery</tt> method.
  # By default <tt>protect_from_forgery</tt> protects your session with
43 44
  # <tt>:null_session</tt> method, which provides an empty session
  # during request.
45
  #
46
  # We may want to disable CSRF protection for APIs since they are typically
47
  # designed to be state-less. That is, the request API client will handle
48 49
  # the session for you instead of Rails.
  #
50 51
  # The token parameter is named <tt>authenticity_token</tt> by default. The name and
  # value of this token must be added to every layout that renders forms by including
H
Hendy Tanata 已提交
52
  # <tt>csrf_meta_tags</tt> in the HTML +head+.
53 54 55
  #
  # Learn more about CSRF attacks and securing your application in the
  # {Ruby on Rails Security Guide}[http://guides.rubyonrails.org/security.html].
56
  module RequestForgeryProtection
57
    extend ActiveSupport::Concern
58

59
    include AbstractController::Helpers
60
    include AbstractController::Callbacks
61 62

    included do
63 64
      # Sets the token parameter name for RequestForgery. Calling +protect_from_forgery+
      # sets it to <tt>:authenticity_token</tt> by default.
65 66
      config_accessor :request_forgery_protection_token
      self.request_forgery_protection_token ||= :authenticity_token
67

68 69 70 71
      # Holds the class which implements the request forgery protection.
      config_accessor :forgery_protection_strategy
      self.forgery_protection_strategy = nil

72
      # Controls whether request forgery protection is turned on or not. Turned off by default only in test mode.
73 74
      config_accessor :allow_forgery_protection
      self.allow_forgery_protection = true if allow_forgery_protection.nil?
75

76 77 78 79
      # Controls whether a CSRF failure logs a warning. On by default.
      config_accessor :log_warning_on_csrf_failure
      self.log_warning_on_csrf_failure = true

80 81 82 83
      # Controls whether the Origin header is checked in addition to the CSRF token.
      config_accessor :forgery_protection_origin_check
      self.forgery_protection_origin_check = false

B
Ben Toews 已提交
84 85 86 87
      # Controls whether form-action/method specific CSRF tokens are used.
      config_accessor :per_form_csrf_tokens
      self.per_form_csrf_tokens = false

88 89
      helper_method :form_authenticity_token
      helper_method :protect_against_forgery?
90
    end
91

92
    module ClassMethods
D
David Albert 已提交
93
      # Turn on request forgery protection. Bear in mind that GET and HEAD requests are not checked.
94
      #
95 96 97 98
      #   class ApplicationController < ActionController::Base
      #     protect_from_forgery
      #   end
      #
D
David Heinemeier Hansson 已提交
99
      #   class FooController < ApplicationController
A
AvnerCohen 已提交
100
      #     protect_from_forgery except: :index
101
      #   end
D
David Heinemeier Hansson 已提交
102
      #
103
      # You can disable forgery protection on controller by skipping the verification before_action:
104
      #
105
      #   skip_before_action :verify_authenticity_token
106
      #
D
David Heinemeier Hansson 已提交
107 108
      # Valid Options:
      #
109
      # * <tt>:only/:except</tt> - Only apply forgery protection to a subset of actions. For example <tt>only: [ :create, :create_all ]</tt>.
110
      # * <tt>:if/:unless</tt> - Turn off the forgery protection entirely depending on the passed Proc or method reference.
111
      # * <tt>:prepend</tt> - By default, the verification of the authentication token will be added at the position of the
112 113
      #   protect_from_forgery call in your application. This means any callbacks added before are run first. This is useful
      #   when you want your forgery protection to depend on other callbacks, like authentication methods (Oauth vs Cookie auth).
114
      #
115
      #   If you need to add verification to the beginning of the callback chain, use <tt>prepend: true</tt>.
116 117 118 119 120 121
      # * <tt>:with</tt> - Set the method to handle unverified request.
      #
      # Valid unverified request handling methods are:
      # * <tt>:exception</tt> - Raises ActionController::InvalidAuthenticityToken exception.
      # * <tt>:reset_session</tt> - Resets the session.
      # * <tt>:null_session</tt> - Provides an empty session during request but doesn't reset it completely. Used as default if <tt>:with</tt> option is not specified.
122
      def protect_from_forgery(options = {})
123
        options = options.reverse_merge(prepend: false)
124

125
        self.forgery_protection_strategy = protection_method_class(options[:with] || :null_session)
126
        self.request_forgery_protection_token ||= :authenticity_token
127
        before_action :verify_authenticity_token, options
128
        append_after_action :verify_same_origin_request
129
      end
130 131 132

      private

133 134 135 136 137
        def protection_method_class(name)
          ActionController::RequestForgeryProtection::ProtectionMethods.const_get(name.to_s.classify)
        rescue NameError
          raise ArgumentError, "Invalid request forgery protection method, use :null_session, :exception, or :reset_session"
        end
138 139 140
    end

    module ProtectionMethods
141 142 143 144
      class NullSession
        def initialize(controller)
          @controller = controller
        end
145 146 147

        # This is the method that defines the application behavior when a request is found to be unverified.
        def handle_unverified_request
148
          request = @controller.request
149
          request.session = NullSessionHash.new(request)
A
Aaron Patterson 已提交
150
          request.flash = nil
151
          request.session_options = { skip: true }
152
          request.cookie_jar = NullCookieJar.build(request, {})
153 154
        end

155
        private
156

157 158 159 160 161 162
          class NullSessionHash < Rack::Session::Abstract::SessionHash #:nodoc:
            def initialize(req)
              super(nil, req)
              @data = {}
              @loaded = true
            end
163

164 165
            # no-op
            def destroy; end
166

167 168 169
            def exists?
              true
            end
170 171
          end

172 173 174 175
          class NullCookieJar < ActionDispatch::Cookies::CookieJar #:nodoc:
            def write(*)
              # nothing
            end
176 177 178
          end
      end

179 180 181 182
      class ResetSession
        def initialize(controller)
          @controller = controller
        end
183 184

        def handle_unverified_request
185
          @controller.reset_session
186 187 188
        end
      end

189 190 191 192
      class Exception
        def initialize(controller)
          @controller = controller
        end
193 194 195 196 197

        def handle_unverified_request
          raise ActionController::InvalidAuthenticityToken
        end
      end
198 199
    end

200
    private
201 202 203 204 205 206 207 208 209 210
      # The actual before_action that is used to verify the CSRF token.
      # Don't override this directly. Provide your own forgery protection
      # strategy instead. If you override, you'll disable same-origin
      # `<script>` verification.
      #
      # Lean on the protect_from_forgery declaration to mark which actions are
      # due for same-origin request verification. If protect_from_forgery is
      # enabled on an action, this before_action flags its after_action to
      # verify that JavaScript responses are for XHR requests, ensuring they
      # follow the browser's same-origin policy.
211
      def verify_authenticity_token # :doc:
212
        mark_for_same_origin_verification!
213 214

        if !verified_request?
215
          if logger && log_warning_on_csrf_failure
216 217 218 219 220
            if valid_request_origin?
              logger.warn "Can't verify CSRF token authenticity."
            else
              logger.warn "HTTP Origin header (#{request.origin}) didn't match request.base_url (#{request.base_url})"
            end
221
          end
222 223 224 225
          handle_unverified_request
        end
      end

226
      def handle_unverified_request # :doc:
S
Santiago Pastorino 已提交
227
        forgery_protection_strategy.new(self).handle_unverified_request
228 229
      end

230
      #:nodoc:
231 232 233 234 235 236 237 238 239
      CROSS_ORIGIN_JAVASCRIPT_WARNING = "Security warning: an embedded " \
        "<script> tag on another site requested protected JavaScript. " \
        "If you know what you're doing, go ahead and disable forgery " \
        "protection on this action to permit cross-origin JavaScript embedding."
      private_constant :CROSS_ORIGIN_JAVASCRIPT_WARNING

      # If `verify_authenticity_token` was run (indicating that we have
      # forgery protection enabled for this request) then also verify that
      # we aren't serving an unauthorized cross-origin response.
240
      def verify_same_origin_request # :doc:
241
        if marked_for_same_origin_verification? && non_xhr_javascript_response?
242 243 244
          if logger && log_warning_on_csrf_failure
            logger.warn CROSS_ORIGIN_JAVASCRIPT_WARNING
          end
245
          raise ActionController::InvalidCrossOriginRequest, CROSS_ORIGIN_JAVASCRIPT_WARNING
246
        end
247 248
      end

249
      # GET requests are checked for cross-origin JavaScript after rendering.
250
      def mark_for_same_origin_verification! # :doc:
251 252 253
        @marked_for_same_origin_verification = request.get?
      end

254 255
      # If the `verify_authenticity_token` before_action ran, verify that
      # JavaScript responses are only served to same-origin GET requests.
256
      def marked_for_same_origin_verification? # :doc:
257
        @marked_for_same_origin_verification ||= false
258 259 260
      end

      # Check for cross-origin JavaScript responses.
261
      def non_xhr_javascript_response? # :doc:
262 263 264
        content_type =~ %r(\Atext/javascript) && !request.xhr?
      end

265 266
      AUTHENTICITY_TOKEN_LENGTH = 32

267
      # Returns true or false if a request is verified. Checks:
268
      #
269
      # * Is it a GET or HEAD request? GETs should be safe and idempotent
270
      # * Does the form_authenticity_token match the given token value from the params?
271
      # * Does the X-CSRF-Token header match the form_authenticity_token?
272
      def verified_request? # :doc:
273
        !protect_against_forgery? || request.get? || request.head? ||
274 275 276 277
          (valid_request_origin? && any_authenticity_token_valid?)
      end

      # Checks if any of the authenticity tokens from the request are valid.
278
      def any_authenticity_token_valid? # :doc:
279 280 281 282 283 284
        request_authenticity_tokens.any? do |token|
          valid_authenticity_token?(session, token)
        end
      end

      # Possible authenticity tokens sent in the request.
285
      def request_authenticity_tokens # :doc:
286
        [form_authenticity_param, request.x_csrf_token]
287
      end
Y
Yehuda Katz 已提交
288

P
Pratik Naik 已提交
289
      # Sets the token value for the current session.
B
Ben Toews 已提交
290 291
      def form_authenticity_token(form_options: {})
        masked_authenticity_token(session, form_options: form_options)
292 293 294 295 296
      end

      # Creates a masked version of the authenticity token that varies
      # on each request. The masking is used to mitigate SSL attacks
      # like BREACH.
297
      def masked_authenticity_token(session, form_options: {}) # :doc:
B
Ben Toews 已提交
298 299 300 301 302 303 304 305 306
        action, method = form_options.values_at(:action, :method)

        raw_token = if per_form_csrf_tokens && action && method
          action_path = normalize_action_path(action)
          per_form_csrf_token(session, action_path, method)
        else
          real_csrf_token(session)
        end

307
        one_time_pad = SecureRandom.random_bytes(AUTHENTICITY_TOKEN_LENGTH)
B
Ben Toews 已提交
308
        encrypted_csrf_token = xor_byte_strings(one_time_pad, raw_token)
309 310 311 312 313 314 315
        masked_token = one_time_pad + encrypted_csrf_token
        Base64.strict_encode64(masked_token)
      end

      # Checks the client's masked token to see if it matches the
      # session token. Essentially the inverse of
      # +masked_authenticity_token+.
316
      def valid_authenticity_token?(session, encoded_masked_token) # :doc:
317 318 319
        if encoded_masked_token.nil? || encoded_masked_token.empty? || !encoded_masked_token.is_a?(String)
          return false
        end
320 321 322

        begin
          masked_token = Base64.strict_decode64(encoded_masked_token)
323
        rescue ArgumentError # encoded_masked_token is invalid Base64
324 325 326 327 328 329 330 331 332 333
          return false
        end

        # See if it's actually a masked token or not. In order to
        # deploy this code, we should be able to handle any unmasked
        # tokens that we've issued without error.

        if masked_token.length == AUTHENTICITY_TOKEN_LENGTH
          # This is actually an unmasked token. This is expected if
          # you have just upgraded to masked tokens, but should stop
334
          # happening shortly after installing this gem.
335 336 337
          compare_with_real_token masked_token, session

        elsif masked_token.length == AUTHENTICITY_TOKEN_LENGTH * 2
B
Ben Toews 已提交
338
          csrf_token = unmask_token(masked_token)
339

B
Ben Toews 已提交
340 341
          compare_with_real_token(csrf_token, session) ||
            valid_per_form_csrf_token?(csrf_token, session)
342
        else
343
          false # Token is malformed.
344 345 346
        end
      end

347
      def unmask_token(masked_token) # :doc:
B
Ben Toews 已提交
348
        # Split the token into the one-time pad and the encrypted
349
        # value and decrypt it.
B
Ben Toews 已提交
350 351 352 353 354
        one_time_pad = masked_token[0...AUTHENTICITY_TOKEN_LENGTH]
        encrypted_csrf_token = masked_token[AUTHENTICITY_TOKEN_LENGTH..-1]
        xor_byte_strings(one_time_pad, encrypted_csrf_token)
      end

355
      def compare_with_real_token(token, session) # :doc:
356
        ActiveSupport::SecurityUtils.secure_compare(token, real_csrf_token(session))
357 358
      end

359
      def valid_per_form_csrf_token?(token, session) # :doc:
B
Ben Toews 已提交
360 361 362 363 364 365 366 367 368 369 370 371 372
        if per_form_csrf_tokens
          correct_token = per_form_csrf_token(
            session,
            normalize_action_path(request.fullpath),
            request.request_method
          )

          ActiveSupport::SecurityUtils.secure_compare(token, correct_token)
        else
          false
        end
      end

373
      def real_csrf_token(session) # :doc:
374 375 376 377
        session[:_csrf_token] ||= SecureRandom.base64(AUTHENTICITY_TOKEN_LENGTH)
        Base64.strict_decode64(session[:_csrf_token])
      end

378
      def per_form_csrf_token(session, action_path, method) # :doc:
B
Ben Toews 已提交
379 380 381 382 383 384 385
        OpenSSL::HMAC.digest(
          OpenSSL::Digest::SHA256.new,
          real_csrf_token(session),
          [action_path, method.downcase].join("#")
        )
      end

386
      def xor_byte_strings(s1, s2) # :doc:
387
        s2_bytes = s2.bytes
388
        s1.each_byte.with_index { |c1, i| s2_bytes[i] ^= c1 }
389
        s2_bytes.pack("C*")
390
      end
391

392
      # The form's authenticity parameter. Override to provide your own.
393
      def form_authenticity_param # :doc:
394 395 396
        params[request_forgery_protection_token]
      end

397
      # Checks if the controller allows forgery protection.
398
      def protect_against_forgery? # :doc:
399
        allow_forgery_protection
400
      end
401 402 403

      # Checks if the request originated from the same origin by looking at the
      # Origin header.
404
      def valid_request_origin? # :doc:
405 406 407 408 409 410 411
        if forgery_protection_origin_check
          # We accept blank origin headers because some user agents don't send it.
          request.origin.nil? || request.origin == request.base_url
        else
          true
        end
      end
B
Ben Toews 已提交
412

413
      def normalize_action_path(action_path) # :doc:
414
        uri = URI.parse(action_path)
415
        uri.path.chomp("/")
B
Ben Toews 已提交
416
      end
417
  end
418
end