Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-28609: fix: authentization bug · ansible-semaphore/semaphore@3e4a62b

api/auth.go in Ansible Semaphore before 2.8.89 mishandles authentication.

CVE
#auth

@@ -11,7 +11,7 @@ import ( “time” )
func authenticationHandler(w http.ResponseWriter, r *http.Request) { func authenticationHandler(w http.ResponseWriter, r *http.Request) bool { var userID int
authHeader := strings.ToLower(r.Header.Get(“authorization”)) @@ -25,7 +25,7 @@ func authenticationHandler(w http.ResponseWriter, r *http.Request) { }
w.WriteHeader(http.StatusUnauthorized) return return false }
userID = token.UserID @@ -34,20 +34,20 @@ func authenticationHandler(w http.ResponseWriter, r *http.Request) { cookie, err := r.Cookie(“semaphore”) if err != nil { w.WriteHeader(http.StatusUnauthorized) return return false }
value := make(map[string]interface{}) if err = util.Cookie.Decode("semaphore", cookie.Value, &value); err != nil { w.WriteHeader(http.StatusUnauthorized) return return false }
user, ok := value[“user”] sessionVal, okSession := value[“session”] if !ok || !okSession { w.WriteHeader(http.StatusUnauthorized) return return false }
userID = user.(int) @@ -58,7 +58,7 @@ func authenticationHandler(w http.ResponseWriter, r *http.Request) {
if err != nil { w.WriteHeader(http.StatusUnauthorized) return return false }
if time.Since(session.LastActive).Hours() > 7*24 { @@ -70,13 +70,13 @@ func authenticationHandler(w http.ResponseWriter, r *http.Request) { }
w.WriteHeader(http.StatusUnauthorized) return return false }
if err := helpers.Store®.TouchSession(userID, sessionID); err != nil { log.Error(err) w.WriteHeader(http.StatusUnauthorized) return return false } }
@@ -87,26 +87,29 @@ func authenticationHandler(w http.ResponseWriter, r *http.Request) { log.Error(err) } w.WriteHeader(http.StatusUnauthorized) return return false }
if util.Config.DemoMode { if !user.Admin && r.Method != “GET” && !strings.HasSuffix(r.URL.Path, “/tasks”) && !strings.HasSuffix(r.URL.Path, “/stop”) { w.WriteHeader(http.StatusUnauthorized) return return false } }
context.Set(r, "user", &user) return true }
// nolint: gocyclo func authentication(next http.Handler) http.Handler { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { authenticationHandler(w, r) next.ServeHTTP(w, r) ok := authenticationHandler(w, r) if ok { next.ServeHTTP(w, r) } }) }
@@ -115,10 +118,14 @@ func authenticationWithStore(next http.Handler) http.Handler { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { store := helpers.Store®
var ok bool
db.StoreSession(store, r.URL.String(), func() { authenticationHandler(w, r) ok = authenticationHandler(w, r) })
next.ServeHTTP(w, r) if ok { next.ServeHTTP(w, r) } }) }

Related news

GHSA-pmhg-cmjc-3875: Ansible Semaphore mishandles authentication

api/auth.go in Ansible Semaphore before 2.8.89 mishandles authentication.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907