diff options
author | Mark Sapiro <msapiro@value.net> | 2012-02-05 13:19:39 -0800 |
---|---|---|
committer | Mark Sapiro <msapiro@value.net> | 2012-02-05 13:19:39 -0800 |
commit | fdd6141b978cdc0876263d962f996eb88964537b (patch) | |
tree | 6836790556e26d896b791946fc60df5d0f88ab8a /Mailman/CSRFcheck.py | |
parent | 3c1fe7bcb3c10650cd039c800aa1356886586873 (diff) | |
download | mailman2-fdd6141b978cdc0876263d962f996eb88964537b.tar.gz mailman2-fdd6141b978cdc0876263d962f996eb88964537b.tar.xz mailman2-fdd6141b978cdc0876263d962f996eb88964537b.zip |
Added Tokio Kikuchi's Cross-site Request Forgery hardening to the admin UI.
Diffstat (limited to '')
-rw-r--r-- | Mailman/CSRFcheck.py | 73 |
1 files changed, 73 insertions, 0 deletions
diff --git a/Mailman/CSRFcheck.py b/Mailman/CSRFcheck.py new file mode 100644 index 00000000..a3b6885a --- /dev/null +++ b/Mailman/CSRFcheck.py @@ -0,0 +1,73 @@ +# Copyright (C) 2011-2012 by the Free Software Foundation, Inc. +# +# This program is free software; you can redistribute it and/or +# modify it under the terms of the GNU General Public License +# as published by the Free Software Foundation; either version 2 +# of the License, or (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, write to the Free Software +# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, +# USA. + +""" Cross-Site Request Forgery checker """ + +import time +import marshal +import binascii + +from Mailman import mm_cfg +from Mailman.Utils import sha_new + +keydict = { + 'user': mm_cfg.AuthUser, + 'poster': mm_cfg.AuthListPoster, + 'moderator': mm_cfg.AuthListModerator, + 'admin': mm_cfg.AuthListAdmin, + 'site': mm_cfg.AuthSiteAdmin, +} + + + +def csrf_token(mlist, contexts, user=None): + """ create token by mailman cookie generation algorithm """ + + for context in contexts: + key, secret = mlist.AuthContextInfo(context, user) + if key: + break + else: + return None # not authenticated + issued = int(time.time()) + mac = sha_new(secret + `issued`).hexdigest() + keymac = '%s:%s' % (key, mac) + token = binascii.hexlify(marshal.dumps((issued, keymac))) + return token + +def csrf_check(mlist, token): + """ check token by mailman cookie validation algorithm """ + + try: + issued, keymac = marshal.loads(binascii.unhexlify(token)) + key, received_mac = keymac.split(':', 1) + klist, key = key.split('+', 1) + assert klist == mlist.internal_name() + if '+' in key: + key, user = key.split('+', 1) + else: + user = None + context = keydict.get(key) + key, secret = mlist.AuthContextInfo(context, user) + assert key + mac = sha_new(secret + `issued`).hexdigest() + if (mac == received_mac + and 0 < time.time() - issued < mm_cfg.FORM_LIFETIME): + return True + return False + except (AssertionError, ValueError, TypeError): + return False |