Software /
code /
prosody-modules
Changeset
5477:5986e0edd7a3
mod_http_oauth2: Use validated redirect URI when returning errors to client
Parsing it from the query again without the validation done by
get_redirect_uri() may lead to open redirect issues.
author | Kim Alvefur <zash@zash.se> |
---|---|
date | Thu, 18 May 2023 14:17:58 +0200 |
parents | 5476:575f52b15f5a |
children | 5478:af105c7a24b2 |
files | mod_http_oauth2/mod_http_oauth2.lua |
diffstat | 1 files changed, 8 insertions(+), 8 deletions(-) [+] |
line wrap: on
line diff
--- a/mod_http_oauth2/mod_http_oauth2.lua Thu May 18 14:07:37 2023 +0200 +++ b/mod_http_oauth2/mod_http_oauth2.lua Thu May 18 14:17:58 2023 +0200 @@ -606,13 +606,12 @@ -- redirect to the user-agent. In some cases we can't do this, e.g. if -- the redirect_uri is missing or invalid. In those cases, we render an -- error directly to the user-agent. -local function error_response(request, err) - local q = request.url.query and http.formdecode(request.url.query); - local redirect_uri = q and q.redirect_uri; +local function error_response(request, redirect_uri, err) if not redirect_uri or not is_secure_redirect(redirect_uri) then module:log("warn", "Missing or invalid redirect_uri %q, rendering error to user-agent", redirect_uri); return render_error(err); end + local q = request.url.query and http.formdecode(request.url.query); local redirect_query = url.parse(redirect_uri); local sep = redirect_query.query and "&" or "?"; redirect_uri = redirect_uri @@ -703,7 +702,8 @@ return render_error(oauth_error("invalid_request", "Invalid 'client_id' parameter")); end - if not get_redirect_uri(client, params.redirect_uri) then + local redirect_uri = get_redirect_uri(client, params.redirect_uri); + if not redirect_uri then return render_error(oauth_error("invalid_request", "Invalid 'redirect_uri' parameter")); end -- From this point we know that redirect_uri is safe to use @@ -711,7 +711,7 @@ local client_response_types = set.new(array(client.response_types or { "code" })); client_response_types = set.intersection(client_response_types, allowed_response_type_handlers); if not client_response_types:contains(params.response_type) then - return error_response(request, oauth_error("invalid_client", "'response_type' not allowed")); + return error_response(request, redirect_uri, oauth_error("invalid_client", "'response_type' not allowed")); end local requested_scopes = parse_scopes(params.scope or ""); @@ -738,7 +738,7 @@ return render_page(templates.consent, { state = auth_state; client = client; scopes = scopes+roles }, true); elseif not auth_state.consent then -- Notify client of rejection - return error_response(request, oauth_error("access_denied")); + return error_response(request, redirect_uri, oauth_error("access_denied")); end -- else auth_state.consent == true @@ -764,11 +764,11 @@ local response_type = params.response_type; local response_handler = response_type_handlers[response_type]; if not response_handler then - return error_response(request, oauth_error("unsupported_response_type")); + return error_response(request, redirect_uri, oauth_error("unsupported_response_type")); end local ret = response_handler(client, params, user_jid, id_token); if errors.is_err(ret) then - return error_response(request, ret); + return error_response(request, redirect_uri, ret); end return ret; end