request_forgery_protection.rb 10.5 KB
Newer Older
A
Arun Agrawal 已提交
1
require 'rack/session/abstract/id'
2
require 'action_controller/metal/exceptions'
J
Jeremy Kemper 已提交
3

4
module ActionController #:nodoc:
5 6
  class InvalidAuthenticityToken < ActionControllerError #:nodoc:
  end
7

8 9 10
  class InvalidCrossOriginRequest < ActionControllerError #:nodoc:
  end

11 12 13
  # Controller actions are protected from Cross-Site Request Forgery (CSRF) attacks
  # by including a token in the rendered html for your application. This token is
  # stored as a random string in the session, to which an attacker does not have
14
  # access. When a request reaches your application, \Rails verifies the received
V
Vijay Dev 已提交
15 16
  # token with the token in the session. Only HTML and JavaScript requests are checked,
  # so this will not protect your XML API (presumably you'll have a different
17 18 19 20 21 22 23 24 25
  # authentication scheme there anyway).
  #
  # GET requests are not protected since they don't have side effects like writing
  # to the database and don't leak sensitive information. JavaScript requests are
  # an exception: a third-party site can use a <script> tag to reference a JavaScript
  # URL on your site. When your JavaScript response loads on their site, it executes.
  # With carefully crafted JavaScript on their end, sensitive data in your JavaScript
  # response may be extracted. To prevent this, only XmlHttpRequest (known as XHR or
  # Ajax) requests are allowed to make GET requests for JavaScript responses.
V
Vijay Dev 已提交
26 27 28
  #
  # It's important to remember that XML or JSON requests are also affected and if
  # you're building an API you'll need something like:
29 30 31
  #
  #   class ApplicationController < ActionController::Base
  #     protect_from_forgery
32
  #     skip_before_action :verify_authenticity_token, if: :json_request?
33 34 35 36 37 38 39
  #
  #     protected
  #
  #     def json_request?
  #       request.format.json?
  #     end
  #   end
40 41
  #
  # CSRF protection is turned on with the <tt>protect_from_forgery</tt> method,
42 43
  # which checks the token and resets the session if it doesn't match what was expected.
  # A call to this method is generated for new \Rails applications by default.
44 45 46
  #
  # The token parameter is named <tt>authenticity_token</tt> by default. The name and
  # value of this token must be added to every layout that renders forms by including
47
  # <tt>csrf_meta_tags</tt> in the html +head+.
48 49 50
  #
  # Learn more about CSRF attacks and securing your application in the
  # {Ruby on Rails Security Guide}[http://guides.rubyonrails.org/security.html].
51
  module RequestForgeryProtection
52
    extend ActiveSupport::Concern
53

54
    include AbstractController::Helpers
55
    include AbstractController::Callbacks
56 57

    included do
58 59
      # Sets the token parameter name for RequestForgery. Calling +protect_from_forgery+
      # sets it to <tt>:authenticity_token</tt> by default.
60 61
      config_accessor :request_forgery_protection_token
      self.request_forgery_protection_token ||= :authenticity_token
62

63 64 65 66
      # Holds the class which implements the request forgery protection.
      config_accessor :forgery_protection_strategy
      self.forgery_protection_strategy = nil

67
      # Controls whether request forgery protection is turned on or not. Turned off by default only in test mode.
68 69
      config_accessor :allow_forgery_protection
      self.allow_forgery_protection = true if allow_forgery_protection.nil?
70

71 72 73 74
      # Controls whether a CSRF failure logs a warning. On by default.
      config_accessor :log_warning_on_csrf_failure
      self.log_warning_on_csrf_failure = true

75 76
      helper_method :form_authenticity_token
      helper_method :protect_against_forgery?
77
    end
78

79
    module ClassMethods
80
      # Turn on request forgery protection. Bear in mind that only non-GET, HTML/JavaScript requests are checked.
81
      #
82 83 84 85
      #   class ApplicationController < ActionController::Base
      #     protect_from_forgery
      #   end
      #
D
David Heinemeier Hansson 已提交
86
      #   class FooController < ApplicationController
A
AvnerCohen 已提交
87
      #     protect_from_forgery except: :index
D
David Heinemeier Hansson 已提交
88
      #
89
      # You can disable CSRF protection on controller by skipping the verification before_action:
90
      #   skip_before_action :verify_authenticity_token
91
      #
D
David Heinemeier Hansson 已提交
92 93
      # Valid Options:
      #
94
      # * <tt>:only/:except</tt> - Passed to the <tt>before_action</tt> call. Set which actions are verified.
95 96 97 98 99 100
      # * <tt>:with</tt> - Set the method to handle unverified request.
      #
      # Valid unverified request handling methods are:
      # * <tt>:exception</tt> - Raises ActionController::InvalidAuthenticityToken exception.
      # * <tt>:reset_session</tt> - Resets the session.
      # * <tt>:null_session</tt> - Provides an empty session during request but doesn't reset it completely. Used as default if <tt>:with</tt> option is not specified.
101
      def protect_from_forgery(options = {})
102
        self.forgery_protection_strategy = protection_method_class(options[:with] || :null_session)
103
        self.request_forgery_protection_token ||= :authenticity_token
104
        prepend_before_action :verify_authenticity_token, options
105
        append_after_action :verify_same_origin_request
106
      end
107 108 109

      private

110
      def protection_method_class(name)
111 112 113 114 115 116 117
        ActionController::RequestForgeryProtection::ProtectionMethods.const_get(name.to_s.classify)
      rescue NameError
        raise ArgumentError, 'Invalid request forgery protection method, use :null_session, :exception, or :reset_session'
      end
    end

    module ProtectionMethods
118 119 120 121
      class NullSession
        def initialize(controller)
          @controller = controller
        end
122 123 124

        # This is the method that defines the application behavior when a request is found to be unverified.
        def handle_unverified_request
125
          request = @controller.request
126
          request.session = NullSessionHash.new(request.env)
127 128 129 130 131
          request.env['action_dispatch.request.flash_hash'] = nil
          request.env['rack.session.options'] = { skip: true }
          request.env['action_dispatch.cookies'] = NullCookieJar.build(request)
        end

132 133
        protected

134
        class NullSessionHash < Rack::Session::Abstract::SessionHash #:nodoc:
135 136 137
          def initialize(env)
            super(nil, env)
            @data = {}
138 139 140
            @loaded = true
          end

141 142 143
          # no-op
          def destroy; end

144 145 146 147 148 149 150
          def exists?
            true
          end
        end

        class NullCookieJar < ActionDispatch::Cookies::CookieJar #:nodoc:
          def self.build(request)
151 152 153
            key_generator = request.env[ActionDispatch::Cookies::GENERATOR_KEY]
            host          = request.host
            secure        = request.ssl?
154

155
            new(key_generator, host, secure, options_for_env({}))
156 157 158 159 160 161 162 163
          end

          def write(*)
            # nothing
          end
        end
      end

164 165 166 167
      class ResetSession
        def initialize(controller)
          @controller = controller
        end
168 169

        def handle_unverified_request
170
          @controller.reset_session
171 172 173
        end
      end

174 175 176 177
      class Exception
        def initialize(controller)
          @controller = controller
        end
178 179 180 181 182

        def handle_unverified_request
          raise ActionController::InvalidAuthenticityToken
        end
      end
183 184 185
    end

    protected
186 187 188 189 190 191 192 193 194 195 196
      # The actual before_action that is used to verify the CSRF token.
      # Don't override this directly. Provide your own forgery protection
      # strategy instead. If you override, you'll disable same-origin
      # `<script>` verification.
      #
      # Lean on the protect_from_forgery declaration to mark which actions are
      # due for same-origin request verification. If protect_from_forgery is
      # enabled on an action, this before_action flags its after_action to
      # verify that JavaScript responses are for XHR requests, ensuring they
      # follow the browser's same-origin policy.
      def verify_authenticity_token
197
        mark_for_same_origin_verification!
198 199

        if !verified_request?
200 201 202
          if logger && log_warning_on_csrf_failure
            logger.warn "Can't verify CSRF token authenticity"
          end
203 204 205 206
          handle_unverified_request
        end
      end

207
      def handle_unverified_request
S
Santiago Pastorino 已提交
208
        forgery_protection_strategy.new(self).handle_unverified_request
209 210
      end

211 212 213 214 215 216 217 218 219 220 221 222 223
      CROSS_ORIGIN_JAVASCRIPT_WARNING = "Security warning: an embedded " \
        "<script> tag on another site requested protected JavaScript. " \
        "If you know what you're doing, go ahead and disable forgery " \
        "protection on this action to permit cross-origin JavaScript embedding."
      private_constant :CROSS_ORIGIN_JAVASCRIPT_WARNING

      # If `verify_authenticity_token` was run (indicating that we have
      # forgery protection enabled for this request) then also verify that
      # we aren't serving an unauthorized cross-origin response.
      def verify_same_origin_request
        if marked_for_same_origin_verification? && non_xhr_javascript_response?
          logger.warn CROSS_ORIGIN_JAVASCRIPT_WARNING if logger
          raise ActionController::InvalidCrossOriginRequest, CROSS_ORIGIN_JAVASCRIPT_WARNING
224
        end
225 226
      end

227 228 229 230 231
      # GET requests are checked for cross-origin JavaScript after rendering.
      def mark_for_same_origin_verification!
        @marked_for_same_origin_verification = request.get?
      end

232 233 234
      # If the `verify_authenticity_token` before_action ran, verify that
      # JavaScript responses are only served to same-origin GET requests.
      def marked_for_same_origin_verification?
235
        @marked_for_same_origin_verification ||= false
236 237 238 239 240 241 242
      end

      # Check for cross-origin JavaScript responses.
      def non_xhr_javascript_response?
        content_type =~ %r(\Atext/javascript) && !request.xhr?
      end

243
      # Returns true or false if a request is verified. Checks:
244
      #
245
      # * is it a GET or HEAD request?  Gets should be safe and idempotent
246
      # * Does the form_authenticity_token match the given token value from the params?
247
      # * Does the X-CSRF-Token header match the form_authenticity_token
248
      def verified_request?
249
        !protect_against_forgery? || request.get? || request.head? ||
250
          form_authenticity_token == form_authenticity_param ||
251
          form_authenticity_token == request.headers['X-CSRF-Token']
252
      end
Y
Yehuda Katz 已提交
253

P
Pratik Naik 已提交
254
      # Sets the token value for the current session.
255
      def form_authenticity_token
256
        session[:_csrf_token] ||= SecureRandom.base64(32)
257
      end
258

259 260 261 262 263
      # The form's authenticity parameter. Override to provide your own.
      def form_authenticity_param
        params[request_forgery_protection_token]
      end

264
      # Checks if the controller allows forgery protection.
265
      def protect_against_forgery?
266
        allow_forgery_protection
267
      end
268
  end
269
end