summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--nova/console/websocketproxy.py22
-rw-r--r--nova/tests/unit/console/test_websocketproxy.py33
-rw-r--r--releasenotes/notes/console-proxy-reject-open-redirect-4ac0a7895acca7eb.yaml19
3 files changed, 74 insertions, 0 deletions
diff --git a/nova/console/websocketproxy.py b/nova/console/websocketproxy.py
index e13b3c0fe1..87d755ec66 100644
--- a/nova/console/websocketproxy.py
+++ b/nova/console/websocketproxy.py
@@ -19,6 +19,7 @@ Leverages websockify.py by Joel Martin
'''
import copy
+import os
import socket
import sys
@@ -305,6 +306,27 @@ class NovaProxyRequestHandler(NovaProxyRequestHandlerBase,
# Fall back to the websockify <= v0.8.0 'socket' method location.
return websockify.WebSocketServer.socket(*args, **kwargs)
+ def send_head(self):
+ # This code is copied from this example patch:
+ # https://bugs.python.org/issue32084#msg306545
+ path = self.translate_path(self.path)
+ if os.path.isdir(path):
+ parts = urlparse.urlsplit(self.path)
+ if not parts.path.endswith('/'):
+ # redirect browser - doing basically what apache does
+ new_parts = (parts[0], parts[1], parts[2] + '/',
+ parts[3], parts[4])
+ new_url = urlparse.urlunsplit(new_parts)
+
+ # Browsers interpret "Location: //uri" as an absolute URI
+ # like "http://URI"
+ if new_url.startswith('//'):
+ self.send_error(400,
+ "URI must not start with //")
+ return None
+
+ return super(NovaProxyRequestHandler, self).send_head()
+
class NovaWebSocketProxy(websockify.WebSocketProxy):
def __init__(self, *args, **kwargs):
diff --git a/nova/tests/unit/console/test_websocketproxy.py b/nova/tests/unit/console/test_websocketproxy.py
index 98e162d59c..45917c2f41 100644
--- a/nova/tests/unit/console/test_websocketproxy.py
+++ b/nova/tests/unit/console/test_websocketproxy.py
@@ -15,6 +15,7 @@
"""Tests for nova websocketproxy."""
import copy
+import io
import socket
import mock
@@ -626,6 +627,38 @@ class NovaProxyRequestHandlerBaseTestCase(test.NoDBTestCase):
self.wh.server.top_new_client(conn, address)
self.assertIsNone(self.wh._compute_rpcapi)
+ def test_reject_open_redirect(self):
+ # This will test the behavior when an attempt is made to cause an open
+ # redirect. It should be rejected.
+ mock_req = mock.MagicMock()
+ mock_req.makefile().readline.side_effect = [
+ b'GET //example.com/%2F.. HTTP/1.1\r\n',
+ b''
+ ]
+
+ client_addr = ('8.8.8.8', 54321)
+ mock_server = mock.MagicMock()
+ # This specifies that the server will be able to handle requests other
+ # than only websockets.
+ mock_server.only_upgrade = False
+
+ # Constructing a handler will process the mock_req request passed in.
+ handler = websocketproxy.NovaProxyRequestHandler(
+ mock_req, client_addr, mock_server)
+
+ # Collect the response data to verify at the end. The
+ # SimpleHTTPRequestHandler writes the response data to a 'wfile'
+ # attribute.
+ output = io.BytesIO()
+ handler.wfile = output
+ # Process the mock_req again to do the capture.
+ handler.do_GET()
+ output.seek(0)
+ result = output.readlines()
+
+ # Verify no redirect happens and instead a 400 Bad Request is returned.
+ self.assertIn('400 URI must not start with //', result[0].decode())
+
class NovaWebsocketSecurityProxyTestCase(test.NoDBTestCase):
diff --git a/releasenotes/notes/console-proxy-reject-open-redirect-4ac0a7895acca7eb.yaml b/releasenotes/notes/console-proxy-reject-open-redirect-4ac0a7895acca7eb.yaml
new file mode 100644
index 0000000000..ce05b9a867
--- /dev/null
+++ b/releasenotes/notes/console-proxy-reject-open-redirect-4ac0a7895acca7eb.yaml
@@ -0,0 +1,19 @@
+---
+security:
+ - |
+ A vulnerability in the console proxies (novnc, serial, spice) that allowed
+ open redirection has been `patched`_. The novnc, serial, and spice console
+ proxies are implemented as websockify servers and the request handler
+ inherits from the python standard SimpleHTTPRequestHandler. There is a
+ `known issue`_ in the SimpleHTTPRequestHandler which allows open redirects
+ by way of URLs in the following format::
+
+ http://vncproxy.my.domain.com//example.com/%2F..
+
+ which if visited, will redirect a user to example.com.
+
+ The novnc, serial, and spice console proxies will now reject requests that
+ pass a redirection URL beginning with "//" with a 400 Bad Request.
+
+ .. _patched: https://bugs.launchpad.net/nova/+bug/1927677
+ .. _known issue: https://bugs.python.org/issue32084