Skip to content

Commit f5af295

Browse files
committed
Avoid errors from invalid Authorization headers (issue2550992).
When a client sends an invalid HTTP Authorization header, this can result in an email being sent to the admin with a backtrace and the "An error has occurred" page being returned to the client, rather than it just being treated as a normal authentication failure. I've observed this happening with an "Authorization: Bearer" header (missing the argument that should come after Bearer); I don't know what client was sending that invalid header, but since it just sent HEAD requests for three random pages with the invalid header, I'm reasonably sure it was a malfunctioning bot rather than any normal browser used by a human. The problem is in the code: # try handling Basic Auth ourselves auth = self.env['HTTP_AUTHORIZATION'] scheme, challenge = auth.split(' ', 1) which results in "ValueError: need more than 1 value to unpack" in the case where the split() call returns only one value. As a malfunctioning client (quite likely probing lots of sites for some sort of vulnerability in some unrelated web service; any site accessible from the public Internet must expect to receive many such probes all the time), it both isn't useful to report to the Roundup admin (because there are such clients attempting dubious things all the time for any site, so reporting them to the admin is just noise) and in the form of that exception gives no user-friendly information to the admin either. Now subsequent code in the Authorization handling *does* catch errors from invalid arguments, so the code certainly isn't consistently trying to pass such exceptions through to the admin either: try: decoded = b2s(base64.b64decode(challenge)) except TypeError: # invalid challenge decoded = '' This fix arranges for ValueError exceptions to be similarly caught around the tuple unpacking of both the header contents and the decoded challenge for Basic auth, so that those exceptions also do not result in exception emails.
1 parent ec7b578 commit f5af295

File tree

2 files changed

+14
-2
lines changed

2 files changed

+14
-2
lines changed

CHANGES.txt

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,8 @@ Fixed:
4949
Schlatterbeck)
5050
- issue2550722: avoid errors from selecting "no selection" on
5151
multilink. (Joseph Myers)
52+
- issue2550992: avoid errors from invalid Authorization
53+
headers. (Joseph Myers)
5254

5355

5456
2018-07-13 1.6.0

roundup/cgi/client.py

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -837,14 +837,24 @@ def determine_user(self):
837837
elif self.env.get('HTTP_AUTHORIZATION', ''):
838838
# try handling Basic Auth ourselves
839839
auth = self.env['HTTP_AUTHORIZATION']
840-
scheme, challenge = auth.split(' ', 1)
840+
try:
841+
scheme, challenge = auth.split(' ', 1)
842+
except ValueError:
843+
# Invalid header.
844+
scheme = ''
845+
challenge = ''
841846
if scheme.lower() == 'basic':
842847
try:
843848
decoded = b2s(base64.b64decode(challenge))
844849
except TypeError:
845850
# invalid challenge
846851
decoded = ''
847-
username, password = decoded.split(':', 1)
852+
try:
853+
username, password = decoded.split(':', 1)
854+
except ValueError:
855+
# Invalid challenge.
856+
username = ''
857+
password = ''
848858
try:
849859
# Current user may not be None, otherwise
850860
# instatiation of the login action will fail.

0 commit comments

Comments
 (0)