Skip to content

Commit 215fcd4

Browse files
committed
Merge tag '0.10.1' into 0.11-maintenance
Fedify 0.10.1
2 parents 5c5c63b + 7163c25 commit 215fcd4

File tree

6 files changed

+214
-0
lines changed

6 files changed

+214
-0
lines changed

.vscode/settings.json

+1
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,7 @@
7979
"RSASSA-PKCS1",
8080
"setext",
8181
"spki",
82+
"SSRF",
8283
"subproperty",
8384
"superproperty",
8485
"supertypes",

CHANGES.md

+41
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,15 @@ Version 0.11.1
88

99
To be released.
1010

11+
- Fixed a SSRF vulnerability in the built-in document loader.
12+
[[CVE-2024-39687]]
13+
14+
- The `fetchDocumentLoader()` function now throws an error when the given
15+
URL is not an HTTP or HTTPS URL or refers to a private network address.
16+
- The `getAuthenticatedDocumentLoader()` function now returns a document
17+
loader that throws an error when the given URL is not an HTTP or HTTPS
18+
URL or refers to a private network address.
19+
1120

1221
Version 0.11.0
1322
--------------
@@ -192,6 +201,21 @@ Released on June 29, 2024.
192201
[#80]: https://github.com/dahlia/fedify/pull/80
193202

194203

204+
Version 0.10.1
205+
--------------
206+
207+
Released on July 5, 2024.
208+
209+
- Fixed a SSRF vulnerability in the built-in document loader.
210+
[[CVE-2024-39687]]
211+
212+
- The `fetchDocumentLoader()` function now throws an error when the given
213+
URL is not an HTTP or HTTPS URL or refers to a private network address.
214+
- The `getAuthenticatedDocumentLoader()` function now returns a document
215+
loader that throws an error when the given URL is not an HTTP or HTTPS
216+
URL or refers to a private network address.
217+
218+
195219
Version 0.10.0
196220
--------------
197221

@@ -353,6 +377,23 @@ is now distributed under the [MIT License] to encourage wider adoption.
353377
[x-forwarded-fetch]: https://github.com/dahlia/x-forwarded-fetch
354378

355379

380+
Version 0.9.2
381+
-------------
382+
383+
Released on July 5, 2024.
384+
385+
- Fixed a SSRF vulnerability in the built-in document loader.
386+
[[CVE-2024-39687]]
387+
388+
- The `fetchDocumentLoader()` function now throws an error when the given
389+
URL is not an HTTP or HTTPS URL or refers to a private network address.
390+
- The `getAuthenticatedDocumentLoader()` function now returns a document
391+
loader that throws an error when the given URL is not an HTTP or HTTPS
392+
URL or refers to a private network address.
393+
394+
[CVE-2024-39687]: https://github.com/dahlia/fedify/security/advisories/GHSA-p9cg-vqcc-grcx
395+
396+
356397
Version 0.9.1
357398
-------------
358399

runtime/docloader.test.ts

+31
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ import {
1212
getAuthenticatedDocumentLoader,
1313
kvCache,
1414
} from "./docloader.ts";
15+
import { UrlError } from "./url.ts";
1516

1617
test("new FetchError()", () => {
1718
const e = new FetchError("https://example.com/", "An error message.");
@@ -72,6 +73,20 @@ test("fetchDocumentLoader()", async (t) => {
7273
});
7374
}
7475
});
76+
77+
await t.step("deny non-HTTP/HTTPS", async () => {
78+
await assertRejects(
79+
() => fetchDocumentLoader("ftp://localhost"),
80+
UrlError,
81+
);
82+
});
83+
84+
await t.step("deny private network", async () => {
85+
await assertRejects(
86+
() => fetchDocumentLoader("https://localhost"),
87+
UrlError,
88+
);
89+
});
7590
});
7691

7792
test("getAuthenticatedDocumentLoader()", async (t) => {
@@ -104,6 +119,22 @@ test("getAuthenticatedDocumentLoader()", async (t) => {
104119
});
105120

106121
mf.uninstall();
122+
123+
await t.step("deny non-HTTP/HTTPS", async () => {
124+
const loader = await getAuthenticatedDocumentLoader({
125+
keyId: new URL("https://example.com/key2"),
126+
privateKey: rsaPrivateKey2,
127+
});
128+
assertRejects(() => loader("ftp://localhost"), UrlError);
129+
});
130+
131+
await t.step("deny private network", async () => {
132+
const loader = await getAuthenticatedDocumentLoader({
133+
keyId: new URL("https://example.com/key2"),
134+
privateKey: rsaPrivateKey2,
135+
});
136+
assertRejects(() => loader("http://localhost"), UrlError);
137+
});
107138
});
108139

109140
test("kvCache()", async (t) => {

runtime/docloader.ts

+3
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ import type { KvKey, KvStore } from "../federation/kv.ts";
33
import { signRequest } from "../sig/http.ts";
44
import { validateCryptoKey } from "../sig/key.ts";
55
import preloadedContexts from "./contexts.ts";
6+
import { validatePublicUrl } from "./url.ts";
67

78
const logger = getLogger(["fedify", "runtime", "docloader"]);
89

@@ -136,6 +137,7 @@ export async function fetchDocumentLoader(
136137
documentUrl: url,
137138
};
138139
}
140+
await validatePublicUrl(url);
139141
const request = createRequest(url);
140142
logRequest(request);
141143
const response = await fetch(request, {
@@ -169,6 +171,7 @@ export function getAuthenticatedDocumentLoader(
169171
): DocumentLoader {
170172
validateCryptoKey(identity.privateKey);
171173
async function load(url: string): Promise<RemoteDocument> {
174+
await validatePublicUrl(url);
172175
let request = createRequest(url);
173176
request = await signRequest(request, identity.privateKey, identity.keyId);
174177
logRequest(request);

runtime/url.test.ts

+62
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
import { assert } from "@std/assert/assert";
2+
import { assertEquals } from "@std/assert/assert-equals";
3+
import { assertFalse } from "@std/assert/assert-false";
4+
import { assertRejects } from "@std/assert/assert-rejects";
5+
import { test } from "../testing/mod.ts";
6+
import {
7+
expandIPv6Address,
8+
isValidPublicIPv4Address,
9+
isValidPublicIPv6Address,
10+
UrlError,
11+
validatePublicUrl,
12+
} from "./url.ts";
13+
14+
test("validatePublicUrl()", async () => {
15+
await assertRejects(() => validatePublicUrl("ftp://localhost"), UrlError);
16+
await assertRejects(
17+
// cSpell: disable
18+
() => validatePublicUrl("data:text/plain;base64,SGVsbG8sIFdvcmxkIQ=="),
19+
// cSpell: enable
20+
UrlError,
21+
);
22+
await assertRejects(() => validatePublicUrl("https://localhost"), UrlError);
23+
await assertRejects(() => validatePublicUrl("https://127.0.0.1"), UrlError);
24+
await assertRejects(() => validatePublicUrl("https://[::1]"), UrlError);
25+
});
26+
27+
test("isValidPublicIPv4Address()", () => {
28+
assert(isValidPublicIPv4Address("8.8.8.8")); // Google DNS
29+
assertFalse(isValidPublicIPv4Address("192.168.1.1")); // private
30+
assertFalse(isValidPublicIPv4Address("127.0.0.1")); // localhost
31+
assertFalse(isValidPublicIPv4Address("10.0.0.1")); // private
32+
assertFalse(isValidPublicIPv4Address("127.16.0.1")); // private
33+
assertFalse(isValidPublicIPv4Address("169.254.0.1")); // link-local
34+
});
35+
36+
test("isValidPublicIPv6Address()", () => {
37+
assert(isValidPublicIPv6Address("2001:db8::1"));
38+
assertFalse(isValidPublicIPv6Address("::1")); // localhost
39+
assertFalse(isValidPublicIPv6Address("fc00::1")); // ULA
40+
assertFalse(isValidPublicIPv6Address("fe80::1")); // link-local
41+
assertFalse(isValidPublicIPv6Address("ff00::1")); // multicast
42+
assertFalse(isValidPublicIPv6Address("::")); // unspecified
43+
});
44+
45+
test("expandIPv6Address()", () => {
46+
assertEquals(
47+
expandIPv6Address("::"),
48+
"0000:0000:0000:0000:0000:0000:0000:0000",
49+
);
50+
assertEquals(
51+
expandIPv6Address("::1"),
52+
"0000:0000:0000:0000:0000:0000:0000:0001",
53+
);
54+
assertEquals(
55+
expandIPv6Address("2001:db8::"),
56+
"2001:0db8:0000:0000:0000:0000:0000:0000",
57+
);
58+
assertEquals(
59+
expandIPv6Address("2001:db8::1"),
60+
"2001:0db8:0000:0000:0000:0000:0000:0001",
61+
);
62+
});

runtime/url.ts

+76
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
import { lookup } from "node:dns/promises";
2+
import { isIP } from "node:net";
3+
4+
export class UrlError extends Error {
5+
constructor(message: string) {
6+
super(message);
7+
this.name = "UrlError";
8+
}
9+
}
10+
11+
/**
12+
* Validates a URL to prevent SSRF attacks.
13+
*/
14+
export async function validatePublicUrl(url: string): Promise<void> {
15+
const parsed = new URL(url);
16+
if (parsed.protocol !== "http:" && parsed.protocol !== "https:") {
17+
throw new UrlError(`Unsupported protocol: ${parsed.protocol}`);
18+
}
19+
let hostname = parsed.hostname;
20+
if (hostname.startsWith("[") && hostname.endsWith("]")) {
21+
hostname = hostname.substring(1, hostname.length - 2);
22+
}
23+
if (hostname === "localhost") {
24+
throw new UrlError("Localhost is not allowed");
25+
}
26+
if ("Deno" in globalThis && !isIP(hostname)) {
27+
// If the `net` permission is not granted, we can't resolve the hostname.
28+
// However, we can safely assume that it cannot gain access to private
29+
// resources.
30+
const netPermission = await Deno.permissions.query({ name: "net" });
31+
if (netPermission.state !== "granted") return;
32+
}
33+
const { address, family } = await lookup(hostname);
34+
if (
35+
family === 4 && !isValidPublicIPv4Address(address) ||
36+
family === 6 && !isValidPublicIPv6Address(address) ||
37+
family < 4 || family === 5 || family > 6
38+
) {
39+
throw new UrlError(`Invalid or private address: ${address}`);
40+
}
41+
}
42+
43+
export function isValidPublicIPv4Address(address: string): boolean {
44+
const parts = address.split(".");
45+
const first = parseInt(parts[0]);
46+
if (first === 0 || first === 10 || first === 127) return false;
47+
const second = parseInt(parts[1]);
48+
if (first === 169 && second === 254) return false;
49+
if (first === 172 && second >= 16 && second <= 31) return false;
50+
if (first === 192 && second === 168) return false;
51+
return true;
52+
}
53+
54+
export function isValidPublicIPv6Address(address: string) {
55+
address = expandIPv6Address(address);
56+
if (address.at(4) !== ":") return false;
57+
const firstWord = parseInt(address.substring(0, 4), 16);
58+
return !(
59+
(firstWord >= 0xfc00 && firstWord <= 0xfdff) || // ULA
60+
(firstWord >= 0xfe80 && firstWord <= 0xfebf) || // Link-local
61+
firstWord === 0 || firstWord >= 0xff00 // Multicast
62+
);
63+
}
64+
65+
export function expandIPv6Address(address: string): string {
66+
address = address.toLowerCase();
67+
if (address === "::") return "0000:0000:0000:0000:0000:0000:0000:0000";
68+
if (address.startsWith("::")) address = "0000" + address;
69+
if (address.endsWith("::")) address = address + "0000";
70+
address = address.replace(
71+
"::",
72+
":0000".repeat(8 - (address.match(/:/g) || []).length) + ":",
73+
);
74+
const parts = address.split(":");
75+
return parts.map((part) => part.padStart(4, "0")).join(":");
76+
}

0 commit comments

Comments
 (0)