summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMark Felder <feld@feld.me>2023-05-29 13:59:51 -0400
committerMark Felder <feld@feld.me>2023-05-29 13:59:51 -0400
commit843fcca5b4d022e4c088d4a60839b4a286500148 (patch)
tree95acf70716457a7098537324edf008afb18a1099
parent506a1c98e716754455387be9ace3ad7aec9c47a3 (diff)
Validate Host header matches expected value before allowing access to MediaProxy
-rw-r--r--lib/pleroma/web/media_proxy/media_proxy_controller.ex12
-rw-r--r--test/pleroma/web/media_proxy/media_proxy_controller_test.exs17
2 files changed, 29 insertions, 0 deletions
diff --git a/lib/pleroma/web/media_proxy/media_proxy_controller.ex b/lib/pleroma/web/media_proxy/media_proxy_controller.ex
index bda5b36ed..767496b68 100644
--- a/lib/pleroma/web/media_proxy/media_proxy_controller.ex
+++ b/lib/pleroma/web/media_proxy/media_proxy_controller.ex
@@ -12,6 +12,7 @@ defmodule Pleroma.Web.MediaProxy.MediaProxyController do
alias Pleroma.Web.MediaProxy
alias Plug.Conn
+ plug(:validate_host)
plug(:sandbox)
def remote(conn, %{"sig" => sig64, "url" => url64}) do
@@ -205,6 +206,17 @@ defmodule Pleroma.Web.MediaProxy.MediaProxyController do
Config.get([:media_proxy, :proxy_opts], [])
end
+ defp validate_host(conn, _params) do
+ proxy_host = MediaProxy.base_url() |> URI.parse() |> Map.get(:host)
+
+ if match?(^proxy_host, conn.host) do
+ conn
+ else
+ send_resp(conn, 400, Conn.Status.reason_phrase(400))
+ |> halt()
+ end
+ end
+
defp sandbox(conn, _params) do
conn
|> merge_resp_headers([{"content-security-policy", "sandbox;"}])
diff --git a/test/pleroma/web/media_proxy/media_proxy_controller_test.exs b/test/pleroma/web/media_proxy/media_proxy_controller_test.exs
index 9ce092fd8..3971330d4 100644
--- a/test/pleroma/web/media_proxy/media_proxy_controller_test.exs
+++ b/test/pleroma/web/media_proxy/media_proxy_controller_test.exs
@@ -54,6 +54,23 @@ defmodule Pleroma.Web.MediaProxy.MediaProxyControllerTest do
} = get(conn, "/proxy/hhgfh/eeee/fff")
end
+ test "it returns a 400 for invalid host", %{conn: conn} do
+ clear_config([:media_proxy, :base_url], "http://mp.localhost/")
+
+ url =
+ MediaProxy.encode_url("https://pleroma.social/logo.jpeg")
+ |> URI.parse()
+ |> Map.put(:host, "wronghost")
+ |> URI.to_string()
+
+ with_mock Pleroma.ReverseProxy,
+ call: fn _conn, _url, _opts -> %Conn{status: :success} end do
+ %{status: status} = get(conn, url)
+
+ assert status == 400
+ end
+ end
+
test "redirects to valid url when filename is invalidated", %{conn: conn, url: url} do
invalid_url = String.replace(url, "test.png", "test-file.png")
response = get(conn, invalid_url)