1
0
Fork 0

Validate note sizes on key-rotation.

We also need to validate the note sizes on key-rotation.
If we do not validate them before we store them, that could lead to a
partial or total loss of the password vault. Validating these
restrictions before actually processing them to store/replace the
existing ciphers should prevent this.

There was also a small bug when using web-sockets. The client which is
triggering the password/key-rotation change should not be forced to
logout via a web-socket request. That is something the client will
handle it self. Refactored the logout notification to either send the
device uuid or not on specific actions.

Fixes #3152
Dieser Commit ist enthalten in:
BlackDex 2023-01-20 15:43:45 +01:00
Ursprung 9b7e86efc2
Commit 34ac16e9d7
Es konnte kein GPG-Schlüssel zu dieser Signatur gefunden werden
GPG-Schlüssel-ID: 58C80A2AA6C765E1
3 geänderte Dateien mit 30 neuen und 8 gelöschten Zeilen

Datei anzeigen

@ -13,7 +13,7 @@ use rocket::{
}; };
use crate::{ use crate::{
api::{core::log_event, ApiResult, EmptyResult, JsonResult, Notify, NumberOrString, UpdateType}, api::{core::log_event, ApiResult, EmptyResult, JsonResult, Notify, NumberOrString},
auth::{decode_admin, encode_jwt, generate_admin_claims, ClientIp}, auth::{decode_admin, encode_jwt, generate_admin_claims, ClientIp},
config::ConfigBuilder, config::ConfigBuilder,
db::{backup_database, get_sql_server_version, models::*, DbConn, DbConnType}, db::{backup_database, get_sql_server_version, models::*, DbConn, DbConnType},
@ -372,7 +372,7 @@ async fn deauth_user(uuid: String, _token: AdminToken, mut conn: DbConn, nt: Not
let save_result = user.save(&mut conn).await; let save_result = user.save(&mut conn).await;
nt.send_user_update(UpdateType::LogOut, &user).await; nt.send_logout(&user, None).await;
save_result save_result
} }
@ -386,7 +386,7 @@ async fn disable_user(uuid: String, _token: AdminToken, mut conn: DbConn, nt: No
let save_result = user.save(&mut conn).await; let save_result = user.save(&mut conn).await;
nt.send_user_update(UpdateType::LogOut, &user).await; nt.send_logout(&user, None).await;
save_result save_result
} }

Datei anzeigen

@ -323,7 +323,10 @@ async fn post_password(
user.akey = data.Key; user.akey = data.Key;
let save_result = user.save(&mut conn).await; let save_result = user.save(&mut conn).await;
nt.send_user_update(UpdateType::LogOut, &user).await; // Prevent loging out the client where the user requested this endpoint from.
// If you do logout the user it will causes issues at the client side.
// Adding the device uuid will prevent this.
nt.send_logout(&user, Some(headers.device.uuid)).await;
save_result save_result
} }
@ -354,7 +357,7 @@ async fn post_kdf(data: JsonUpcase<ChangeKdfData>, headers: Headers, mut conn: D
user.akey = data.Key; user.akey = data.Key;
let save_result = user.save(&mut conn).await; let save_result = user.save(&mut conn).await;
nt.send_user_update(UpdateType::LogOut, &user).await; nt.send_logout(&user, Some(headers.device.uuid)).await;
save_result save_result
} }
@ -392,6 +395,12 @@ async fn post_rotatekey(
err!("Invalid password") err!("Invalid password")
} }
// Validate the import before continuing
// Bitwarden does not process the import if there is one item invalid.
// Since we check for the size of the encrypted note length, we need to do that here to pre-validate it.
// TODO: See if we can optimize the whole cipher adding/importing and prevent duplicate code and checks.
Cipher::validate_notes(&data.Ciphers)?;
let user_uuid = &headers.user.uuid; let user_uuid = &headers.user.uuid;
// Update folder data // Update folder data
@ -438,7 +447,10 @@ async fn post_rotatekey(
let save_result = user.save(&mut conn).await; let save_result = user.save(&mut conn).await;
nt.send_user_update(UpdateType::LogOut, &user).await; // Prevent loging out the client where the user requested this endpoint from.
// If you do logout the user it will causes issues at the client side.
// Adding the device uuid will prevent this.
nt.send_logout(&user, Some(headers.device.uuid)).await;
save_result save_result
} }
@ -461,7 +473,7 @@ async fn post_sstamp(
user.reset_security_stamp(); user.reset_security_stamp();
let save_result = user.save(&mut conn).await; let save_result = user.save(&mut conn).await;
nt.send_user_update(UpdateType::LogOut, &user).await; nt.send_logout(&user, None).await;
save_result save_result
} }
@ -564,7 +576,7 @@ async fn post_email(
user.akey = data.Key; user.akey = data.Key;
let save_result = user.save(&mut conn).await; let save_result = user.save(&mut conn).await;
nt.send_user_update(UpdateType::LogOut, &user).await; nt.send_logout(&user, None).await;
save_result save_result
} }

Datei anzeigen

@ -170,6 +170,16 @@ impl WebSocketUsers {
self.send_update(&user.uuid, &data).await; self.send_update(&user.uuid, &data).await;
} }
pub async fn send_logout(&self, user: &User, acting_device_uuid: Option<String>) {
let data = create_update(
vec![("UserId".into(), user.uuid.clone().into()), ("Date".into(), serialize_date(user.updated_at))],
UpdateType::LogOut,
acting_device_uuid,
);
self.send_update(&user.uuid, &data).await;
}
pub async fn send_folder_update(&self, ut: UpdateType, folder: &Folder, acting_device_uuid: &String) { pub async fn send_folder_update(&self, ut: UpdateType, folder: &Folder, acting_device_uuid: &String) {
let data = create_update( let data = create_update(
vec![ vec![