Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-3456: Improve ratelimit implementation · ikus060/rdiffweb@b78ec09

Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0.

CVE
#web#git#auth

@@ -19,9 +19,9 @@ @author: Patrik Dufresne “"” import os

from parameterized import parameterized from parameterized import parameterized, parameterized_class
import rdiffweb.test from rdiffweb.core.model import DbSession, SessionObject, UserObject @@ -212,67 +212,80 @@ def test_getpage_default(self): self.assertInBody(‘HEADER-NAME’)

@parameterized_class( [ {"default_config": {’rate-limit’: 5}}, {"default_config": {’rate-limit’: 5, 'rate-limit-dir’: '/tmp’}}, ] ) class LoginPageRateLimitTest(rdiffweb.test.WebCase):
default_config = { 'rate-limit’: 5, } def setUp(self): if os.path.isfile(‘/tmp/ratelimit-127.0.0.1’): os.unlink(‘/tmp/ratelimit-127.0.0.1’) if os.path.isfile(‘/tmp/ratelimit-127.0.0.1.-login’): os.unlink(‘/tmp/ratelimit-127.0.0.1.-login’) return super().setUp()
def test_login_ratelimit(self): # Given an unauthenticate # When requesting multple time the login page for i in range(0, 6): self.getPage(‘/login/’) # When requesting multiple time the login page for i in range(1, 5): self.getPage('/login/’, method=’POST’, body={’login’: 'invalid’, 'password’: 'invalid’}) self.assertStatus(200) # Then a 429 error (too many request) is return self.getPage('/login/’, method=’POST’, body={’login’: 'invalid’, 'password’: 'invalid’}) self.assertStatus(429)

class LoginPageRateLimitWithSessionDirTest(rdiffweb.test.WebCase): class LoginPageRateLimitTest2(rdiffweb.test.WebCase):
default_config = { 'rate-limit-dir’: '/tmp’, 'rate-limit’: 5, } default_config = {’rate-limit’: 5}
def test_login_ratelimit(self): def test_login_ratelimit_forwarded_for(self): # Given an unauthenticate # When requesting multple time the login page for i in range(0, 6): self.getPage(‘/login/’) # Then a 429 error (too many request) is return # When requesting multiple time the login page with different `X-Forwarded-For` for i in range(1, 5): self.getPage( '/login/’, headers=[('X-Forwarded-For’, ‘127.0.0.%s’ % i)], method=’POST’, body={’login’: 'invalid’, 'password’: 'invalid’}, ) self.assertStatus(200) # Then original IP get blocked self.getPage( '/login/’, headers=[('X-Forwarded-For’, ‘127.0.0.%s’ % i)], method=’POST’, body={’login’: 'invalid’, 'password’: 'invalid’}, ) self.assertStatus(429)

class LoginPageRateLimitTestWithXForwardedFor(rdiffweb.test.WebCase): class LoginPageRateLimitTest3(rdiffweb.test.WebCase): default_config = {’rate-limit’: 5}
default_config = { 'rate-limit’: 5, }
def test_login_ratelimit(self): def test_login_ratelimit_real_ip(self): # Given an unauthenticate # When requesting multple time the login page for i in range(0, 6): self.getPage('/login/’, headers=[('X-Forwarded-For’, ‘127.0.0.%s’ % i)]) # Then a 429 error (too many request) is return # When requesting multiple time the login page with different `X-Real-IP` for i in range(1, 5): self.getPage( '/login/’, headers=[('X-Real-IP’, ‘127.0.0.128’)], method=’POST’, body={’login’: 'invalid’, 'password’: 'invalid’}, ) self.assertStatus(200) # Then the X-Real-IP get blocked self.getPage( '/login/’, headers=[('X-Real-IP’, ‘127.0.0.128’)], method=’POST’, body={’login’: 'invalid’, 'password’: 'invalid’}, ) self.assertStatus(429)

class LoginPageRateLimitTestWithXRealIP(rdiffweb.test.WebCase):
default_config = { 'rate-limit’: 5, }
def test_login_ratelimit(self): # Given an unauthenticate # When requesting multple time the login page for i in range(0, 6): self.getPage('/login/’, headers=[('X-Real-IP’, ‘127.0.0.%s’ % i)]) # Then a 200 is return. self.assertStatus(200)

class LogoutPageTest(rdiffweb.test.WebCase): def test_getpage_without_login(self): # Given an unauthenticated user

Related news

GHSA-92gf-p376-6r9r: Missing rate limit on rdiffweb

Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907