Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
E
edx-platform-release
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Package Registry
Model registry
Operate
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Hsin-Yu Chien
edx-platform-release
Commits
4126f3a2
Commit
4126f3a2
authored
12 years ago
by
Nate Hardison
Browse files
Options
Downloads
Patches
Plain Diff
Validating OpenID request trust roots to only come from *.cs50.net
parent
6de28fc5
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
common/djangoapps/external_auth/views.py
+42
-2
42 additions, 2 deletions
common/djangoapps/external_auth/views.py
with
42 additions
and
2 deletions
common/djangoapps/external_auth/views.py
+
42
−
2
View file @
4126f3a2
...
...
@@ -33,7 +33,7 @@ from openid.consumer.consumer import (Consumer, SUCCESS, CANCEL, FAILURE)
import
django_openid_auth.views
as
openid_views
from
openid.server.server
import
Server
,
ProtocolError
,
CheckIDRequest
,
EncodingError
from
openid.server.trustroot
import
verifyReturnTo
from
openid.server.trustroot
import
TrustRoot
from
openid.store.filestore
import
FileOpenIDStore
from
openid.yadis.discover
import
DiscoveryFailure
from
openid.consumer.discover
import
OPENID_IDP_2_0_TYPE
...
...
@@ -255,7 +255,7 @@ def provider_respond(server, request, response, data):
Respond to an OpenID request
"""
# get simple registration request
# get simple registration request
sreg_data
=
{}
sreg_request
=
sreg
.
SRegRequest
.
fromOpenIDRequest
(
request
)
sreg_fields
=
sreg_request
.
allRequestedFields
()
...
...
@@ -305,6 +305,37 @@ def provider_respond(server, request, response, data):
return
http_response
def
validate_trust_root
(
openid_request
):
"""
Only allow OpenID requests from valid trust roots
"""
# verify the trust root/return to
trust_root
=
openid_request
.
trust_root
return_to
=
openid_request
.
return_to
# don't allow empty trust roots
if
openid_request
.
trust_root
is
None
:
return
false
# ensure trust root parses cleanly (one wildcard, of form *.foo.com, etc.)
trust_root
=
TrustRoot
.
parse
(
openid_request
.
trust_root
)
if
trust_root
is
None
:
return
false
# don't allow empty return tos
if
openid_request
.
return_to
is
None
:
return
false
# ensure return to is within trust root
if
not
trust_root
.
validateURL
(
openid_request
.
return_to
):
return
false
# only allow *.cs50.net for now
return
trust_root
.
host
.
endswith
(
'
cs50.net
'
)
@csrf_exempt
def
provider_login
(
request
):
"""
...
...
@@ -323,6 +354,10 @@ def provider_login(request):
# decode request
openid_request
=
server
.
decodeRequest
(
query
)
# don't allow invalid and non-*.cs50.net trust roots
if
not
validate_trust_root
(
openid_request
):
return
default_render_failure
(
request
,
"
Invalid OpenID trust root
"
)
# checkid_immediate not supported, require user interaction
if
openid_request
.
mode
==
'
checkid_immediate
'
:
return
provider_respond
(
server
,
openid_request
,
openid_request
.
answer
(
false
),
{})
...
...
@@ -351,6 +386,10 @@ def provider_login(request):
openid_request
=
request
.
session
[
'
openid_request
'
]
del
request
.
session
[
'
openid_request
'
]
# don't allow invalid and non-*.cs50.net trust roots
if
not
validate_trust_root
(
openid_request
):
return
default_render_failure
(
request
,
"
Invalid OpenID trust root
"
)
# check if user with given email exists
email
=
request
.
POST
[
'
email
'
]
password
=
request
.
POST
[
'
password
'
]
...
...
@@ -431,3 +470,4 @@ def provider_xrds(request):
# custom XRDS header necessary for discovery process
response
[
'
X-XRDS-Location
'
]
=
get_xrds_url
(
'
xrds
'
,
request
)
return
response
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment