1
0
mirror of https://github.com/fafhrd91/actix-web synced 2024-11-28 18:02:39 +01:00
actix-web/src/middleware/csrf.rs

278 lines
8.6 KiB
Rust
Raw Normal View History

2018-03-02 19:35:41 +01:00
//! A filter for cross-site request forgery (CSRF).
//!
//! This middleware is stateless and [based on request
//! headers](https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet#Verifying_Same_Origin_with_Standard_Headers).
//!
//! By default requests are allowed only if one of these is true:
//!
//! * The request method is safe (`GET`, `HEAD`, `OPTIONS`). It is the
//! applications responsibility to ensure these methods cannot be used to
//! execute unwanted actions. Note that upgrade requests for websockets are
//! also considered safe.
//! * The `Origin` header (added automatically by the browser) matches one
//! of the allowed origins.
//! * There is no `Origin` header but the `Referer` header matches one of
//! the allowed origins.
//!
2018-04-09 19:40:12 +02:00
//! Use [`CsrfFilter::allow_xhr()`](struct.CsrfFilter.html#method.allow_xhr)
2018-03-02 19:35:41 +01:00
//! if you want to allow requests with unsafe methods via
//! [CORS](../cors/struct.Cors.html).
//!
//! # Example
//!
//! ```
//! # extern crate actix_web;
2018-03-31 09:16:55 +02:00
//! use actix_web::{http, App, HttpRequest, HttpResponse};
2018-03-02 19:35:41 +01:00
//! use actix_web::middleware::csrf;
//!
2018-03-31 02:31:18 +02:00
//! fn handle_post(_: HttpRequest) -> &'static str {
2018-03-02 19:35:41 +01:00
//! "This action should only be triggered with requests from the same site"
//! }
//!
//! fn main() {
2018-03-31 09:16:55 +02:00
//! let app = App::new()
2018-03-02 19:35:41 +01:00
//! .middleware(
2018-04-09 19:40:12 +02:00
//! csrf::CsrfFilter::new()
//! .allowed_origin("https://www.example.com"))
2018-03-02 19:35:41 +01:00
//! .resource("/", |r| {
//! r.method(http::Method::GET).f(|_| HttpResponse::Ok());
2018-03-31 02:31:18 +02:00
//! r.method(http::Method::POST).f(handle_post);
2018-03-02 19:35:41 +01:00
//! })
//! .finish();
//! }
//! ```
//!
//! In this example the entire application is protected from CSRF.
use std::borrow::Cow;
use std::collections::HashSet;
use bytes::Bytes;
2018-04-14 01:02:01 +02:00
use error::{ResponseError, Result};
use http::{header, HeaderMap, HttpTryFrom, Uri};
use httpmessage::HttpMessage;
2018-03-02 19:35:41 +01:00
use httprequest::HttpRequest;
use httpresponse::HttpResponse;
use middleware::{Middleware, Started};
/// Potential cross-site request forgery detected.
#[derive(Debug, Fail)]
pub enum CsrfError {
/// The HTTP request header `Origin` was required but not provided.
2018-04-14 01:02:01 +02:00
#[fail(display = "Origin header required")]
2018-03-02 19:35:41 +01:00
MissingOrigin,
/// The HTTP request header `Origin` could not be parsed correctly.
2018-04-14 01:02:01 +02:00
#[fail(display = "Could not parse Origin header")]
2018-03-02 19:35:41 +01:00
BadOrigin,
/// The cross-site request was denied.
2018-04-14 01:02:01 +02:00
#[fail(display = "Cross-site request denied")]
2018-03-02 19:35:41 +01:00
CsrDenied,
}
impl ResponseError for CsrfError {
fn error_response(&self) -> HttpResponse {
HttpResponse::Forbidden().body(self.to_string())
2018-03-02 19:35:41 +01:00
}
}
fn uri_origin(uri: &Uri) -> Option<String> {
match (uri.scheme_part(), uri.host(), uri.port()) {
(Some(scheme), Some(host), Some(port)) => {
Some(format!("{}://{}:{}", scheme, host, port))
}
2018-04-14 01:02:01 +02:00
(Some(scheme), Some(host), None) => Some(format!("{}://{}", scheme, host)),
_ => None,
2018-03-02 19:35:41 +01:00
}
}
fn origin(headers: &HeaderMap) -> Option<Result<Cow<str>, CsrfError>> {
2018-04-14 01:02:01 +02:00
headers
.get(header::ORIGIN)
2018-03-02 19:35:41 +01:00
.map(|origin| {
2018-04-29 18:09:08 +02:00
origin
.to_str()
.map_err(|_| CsrfError::BadOrigin)
.map(|o| o.into())
2018-03-02 19:35:41 +01:00
})
.or_else(|| {
2018-04-14 01:02:01 +02:00
headers.get(header::REFERER).map(|referer| {
Uri::try_from(Bytes::from(referer.as_bytes()))
.ok()
.as_ref()
.and_then(uri_origin)
.ok_or(CsrfError::BadOrigin)
.map(|o| o.into())
})
2018-03-02 19:35:41 +01:00
})
}
/// A middleware that filters cross-site requests.
///
/// To construct a CSRF filter:
///
/// 1. Call [`CsrfFilter::build`](struct.CsrfFilter.html#method.build) to
/// start building.
/// 2. [Add](struct.CsrfFilterBuilder.html#method.allowed_origin) allowed
/// origins.
/// 3. Call [finish](struct.CsrfFilterBuilder.html#method.finish) to retrieve
/// the constructed filter.
///
/// # Example
///
/// ```
2018-04-09 18:49:07 +02:00
/// use actix_web::App;
2018-03-02 19:35:41 +01:00
/// use actix_web::middleware::csrf;
///
2018-04-09 18:49:07 +02:00
/// # fn main() {
/// let app = App::new().middleware(
/// csrf::CsrfFilter::new()
/// .allowed_origin("https://www.example.com"));
/// # }
2018-03-02 19:35:41 +01:00
/// ```
#[derive(Default)]
2018-04-09 18:49:07 +02:00
pub struct CsrfFilter {
origins: HashSet<String>,
allow_xhr: bool,
allow_missing_origin: bool,
allow_upgrade: bool,
2018-03-02 19:35:41 +01:00
}
2018-04-09 18:49:07 +02:00
impl CsrfFilter {
/// Start building a `CsrfFilter`.
pub fn new() -> CsrfFilter {
CsrfFilter {
origins: HashSet::new(),
allow_xhr: false,
allow_missing_origin: false,
allow_upgrade: false,
}
}
2018-03-02 19:35:41 +01:00
/// Add an origin that is allowed to make requests. Will be verified
/// against the `Origin` request header.
pub fn allowed_origin<T: Into<String>>(mut self, origin: T) -> CsrfFilter {
self.origins.insert(origin.into());
2018-03-02 19:35:41 +01:00
self
}
/// Allow all requests with an `X-Requested-With` header.
///
/// A cross-site attacker should not be able to send requests with custom
/// headers unless a CORS policy whitelists them. Therefore it should be
/// safe to allow requests with an `X-Requested-With` header (added
/// automatically by many JavaScript libraries).
///
/// This is disabled by default, because in Safari it is possible to
/// circumvent this using redirects and Flash.
///
/// Use this method to enable more lax filtering.
2018-04-09 18:49:07 +02:00
pub fn allow_xhr(mut self) -> CsrfFilter {
self.allow_xhr = true;
2018-03-02 19:35:41 +01:00
self
}
/// Allow requests if the expected `Origin` header is missing (and
/// there is no `Referer` to fall back on).
///
/// The filter is conservative by default, but it should be safe to allow
/// missing `Origin` headers because a cross-site attacker cannot prevent
/// the browser from sending `Origin` on unsafe requests.
2018-04-09 18:49:07 +02:00
pub fn allow_missing_origin(mut self) -> CsrfFilter {
self.allow_missing_origin = true;
2018-03-02 19:35:41 +01:00
self
}
/// Allow cross-site upgrade requests (for example to open a WebSocket).
2018-04-09 18:49:07 +02:00
pub fn allow_upgrade(mut self) -> CsrfFilter {
self.allow_upgrade = true;
self
}
2018-04-09 18:49:07 +02:00
fn validate<S>(&self, req: &mut HttpRequest<S>) -> Result<(), CsrfError> {
let is_upgrade = req.headers().contains_key(header::UPGRADE);
let is_safe = req.method().is_safe() && (self.allow_upgrade || !is_upgrade);
2018-04-14 01:02:01 +02:00
if is_safe || (self.allow_xhr && req.headers().contains_key("x-requested-with"))
{
2018-04-09 18:49:07 +02:00
Ok(())
} else if let Some(header) = origin(req.headers()) {
match header {
Ok(ref origin) if self.origins.contains(origin.as_ref()) => Ok(()),
Ok(_) => Err(CsrfError::CsrDenied),
Err(err) => Err(err),
}
} else if self.allow_missing_origin {
Ok(())
} else {
Err(CsrfError::MissingOrigin)
}
}
}
impl<S> Middleware<S> for CsrfFilter {
fn start(&self, req: &mut HttpRequest<S>) -> Result<Started> {
self.validate(req)?;
Ok(Started::Done)
2018-03-02 19:35:41 +01:00
}
}
#[cfg(test)]
mod tests {
use super::*;
use http::Method;
use test::TestRequest;
#[test]
fn test_safe() {
2018-04-14 01:02:01 +02:00
let csrf = CsrfFilter::new().allowed_origin("https://www.example.com");
2018-03-02 19:35:41 +01:00
let mut req = TestRequest::with_header("Origin", "https://www.w3.org")
.method(Method::HEAD)
.finish();
assert!(csrf.start(&mut req).is_ok());
}
#[test]
fn test_csrf() {
2018-04-14 01:02:01 +02:00
let csrf = CsrfFilter::new().allowed_origin("https://www.example.com");
2018-03-02 19:35:41 +01:00
let mut req = TestRequest::with_header("Origin", "https://www.w3.org")
.method(Method::POST)
.finish();
assert!(csrf.start(&mut req).is_err());
}
#[test]
fn test_referer() {
2018-04-14 01:02:01 +02:00
let csrf = CsrfFilter::new().allowed_origin("https://www.example.com");
2018-03-02 19:35:41 +01:00
2018-04-14 01:02:01 +02:00
let mut req = TestRequest::with_header(
"Referer",
"https://www.example.com/some/path?query=param",
).method(Method::POST)
2018-03-02 19:35:41 +01:00
.finish();
assert!(csrf.start(&mut req).is_ok());
}
2018-03-07 18:42:21 +01:00
#[test]
fn test_upgrade() {
2018-04-14 01:02:01 +02:00
let strict_csrf = CsrfFilter::new().allowed_origin("https://www.example.com");
2018-03-07 18:42:21 +01:00
2018-04-29 18:09:08 +02:00
let lax_csrf = CsrfFilter::new()
.allowed_origin("https://www.example.com")
.allow_upgrade();
2018-03-07 18:42:21 +01:00
let mut req = TestRequest::with_header("Origin", "https://cswsh.com")
.header("Connection", "Upgrade")
.header("Upgrade", "websocket")
.method(Method::GET)
.finish();
assert!(strict_csrf.start(&mut req).is_err());
assert!(lax_csrf.start(&mut req).is_ok());
}
2018-03-02 19:35:41 +01:00
}