aboutsummaryrefslogtreecommitdiffstats
path: root/Mailman/CSRFcheck.py
diff options
context:
space:
mode:
authorMark Sapiro <msapiro@value.net>2012-02-05 13:19:39 -0800
committerMark Sapiro <msapiro@value.net>2012-02-05 13:19:39 -0800
commitfdd6141b978cdc0876263d962f996eb88964537b (patch)
tree6836790556e26d896b791946fc60df5d0f88ab8a /Mailman/CSRFcheck.py
parent3c1fe7bcb3c10650cd039c800aa1356886586873 (diff)
downloadmailman2-fdd6141b978cdc0876263d962f996eb88964537b.tar.gz
mailman2-fdd6141b978cdc0876263d962f996eb88964537b.tar.xz
mailman2-fdd6141b978cdc0876263d962f996eb88964537b.zip
Added Tokio Kikuchi's Cross-site Request Forgery hardening to the admin UI.
Diffstat (limited to '')
-rw-r--r--Mailman/CSRFcheck.py73
1 files changed, 73 insertions, 0 deletions
diff --git a/Mailman/CSRFcheck.py b/Mailman/CSRFcheck.py
new file mode 100644
index 00000000..a3b6885a
--- /dev/null
+++ b/Mailman/CSRFcheck.py
@@ -0,0 +1,73 @@
+# Copyright (C) 2011-2012 by the Free Software Foundation, Inc.
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU General Public License
+# as published by the Free Software Foundation; either version 2
+# of the License, or (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,
+# USA.
+
+""" Cross-Site Request Forgery checker """
+
+import time
+import marshal
+import binascii
+
+from Mailman import mm_cfg
+from Mailman.Utils import sha_new
+
+keydict = {
+ 'user': mm_cfg.AuthUser,
+ 'poster': mm_cfg.AuthListPoster,
+ 'moderator': mm_cfg.AuthListModerator,
+ 'admin': mm_cfg.AuthListAdmin,
+ 'site': mm_cfg.AuthSiteAdmin,
+}
+
+
+
+def csrf_token(mlist, contexts, user=None):
+ """ create token by mailman cookie generation algorithm """
+
+ for context in contexts:
+ key, secret = mlist.AuthContextInfo(context, user)
+ if key:
+ break
+ else:
+ return None # not authenticated
+ issued = int(time.time())
+ mac = sha_new(secret + `issued`).hexdigest()
+ keymac = '%s:%s' % (key, mac)
+ token = binascii.hexlify(marshal.dumps((issued, keymac)))
+ return token
+
+def csrf_check(mlist, token):
+ """ check token by mailman cookie validation algorithm """
+
+ try:
+ issued, keymac = marshal.loads(binascii.unhexlify(token))
+ key, received_mac = keymac.split(':', 1)
+ klist, key = key.split('+', 1)
+ assert klist == mlist.internal_name()
+ if '+' in key:
+ key, user = key.split('+', 1)
+ else:
+ user = None
+ context = keydict.get(key)
+ key, secret = mlist.AuthContextInfo(context, user)
+ assert key
+ mac = sha_new(secret + `issued`).hexdigest()
+ if (mac == received_mac
+ and 0 < time.time() - issued < mm_cfg.FORM_LIFETIME):
+ return True
+ return False
+ except (AssertionError, ValueError, TypeError):
+ return False