代码拉取完成,页面将自动刷新
From 3b6de877f048f3875b48f36a66d10a7156106236 Mon Sep 17 00:00:00 2001
From: bwzhang <zhangbowei@kylinos.cn>
Date: Wed, 24 Apr 2024 09:28:16 +0800
Subject: [PATCH] fix CVE-2021-28235
---
etcdserver/v3_server.go | 7 ++++
tests/e2e/ctl_v3_auth_security_test.go | 57 ++++++++++++++++++++++++++
tests/e2e/ctl_v3_test.go | 6 +++
tests/e2e/util.go | 9 ++++
4 files changed, 79 insertions(+)
create mode 100644 tests/e2e/ctl_v3_auth_security_test.go
diff --git a/etcdserver/v3_server.go b/etcdserver/v3_server.go
index dee5c20..6ef9e61 100644
--- a/etcdserver/v3_server.go
+++ b/etcdserver/v3_server.go
@@ -431,6 +431,13 @@ func (s *EtcdServer) Authenticate(ctx context.Context, r *pb.AuthenticateRequest
lg := s.getLogger()
+ // fix https://nvd.nist.gov/vuln/detail/CVE-2021-28235
+ defer func() {
+ if r != nil {
+ r.Password = ""
+ }
+ }()
+
var resp proto.Message
for {
checkedRevision, err := s.AuthStore().CheckPassword(r.Name, r.Password)
diff --git a/tests/e2e/ctl_v3_auth_security_test.go b/tests/e2e/ctl_v3_auth_security_test.go
new file mode 100644
index 0000000..754fa4b
--- /dev/null
+++ b/tests/e2e/ctl_v3_auth_security_test.go
@@ -0,0 +1,57 @@
+// Copyright 2023 The etcd Authors
+//
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+
+//go:build !cluster_proxy
+
+package e2e
+
+import (
+ "strings"
+ "testing"
+
+ "github.com/stretchr/testify/require"
+
+ "go.etcd.io/etcd/tests/v3/framework/e2e"
+)
+
+// TestAuth_CVE_2021_28235 verifies https://nvd.nist.gov/vuln/detail/CVE-2021-28235
+func TestAuth_CVE_2021_28235(t *testing.T) {
+ testCtl(t, authTest_CVE_2021_28235, withCfg(*e2e.NewConfigNoTLS()), withLogLevel("debug"))
+}
+
+func authTest_CVE_2021_28235(cx ctlCtx) {
+ // create root user with root role
+ rootPass := "changeme123"
+ err := ctlV3User(cx, []string{"add", "root", "--interactive=false"}, "User root created", []string{rootPass})
+ require.NoError(cx.t, err)
+ err = ctlV3User(cx, []string{"grant-role", "root", "root"}, "Role root is granted to user root", nil)
+ require.NoError(cx.t, err)
+ err = ctlV3AuthEnable(cx)
+ require.NoError(cx.t, err)
+
+ // issue a put request
+ cx.user, cx.pass = "root", rootPass
+ err = ctlV3Put(cx, "foo", "bar", "")
+ require.NoError(cx.t, err)
+
+ // GET /debug/requests
+ httpEndpoint := cx.epc.Procs[0].EndpointsHTTP()[0]
+ req := e2e.CURLReq{Endpoint: "/debug/requests?fam=grpc.Recv.etcdserverpb.Auth&b=0&exp=1", Timeout: 5}
+ respData, err := curl(httpEndpoint, "GET", req, e2e.ClientNonTLS)
+ require.NoError(cx.t, err)
+
+ if strings.Contains(respData, rootPass) {
+ cx.t.Errorf("The root password is included in the request.\n %s", respData)
+ }
+}
diff --git a/tests/e2e/ctl_v3_test.go b/tests/e2e/ctl_v3_test.go
index 04f5a65..74b1838 100644
--- a/tests/e2e/ctl_v3_test.go
+++ b/tests/e2e/ctl_v3_test.go
@@ -130,6 +130,12 @@ func withFlagByEnv() ctlOption {
return func(cx *ctlCtx) { cx.envMap = make(map[string]struct{}) }
}
+func withLogLevel(logLevel string) ctlOption {
+ return func(cx *ctlCtx) {
+ cx.cfg.LogLevel = logLevel
+ }
+}
+
func testCtl(t *testing.T, testFunc func(ctlCtx), opts ...ctlOption) {
defer testutil.AfterTest(t)
diff --git a/tests/e2e/util.go b/tests/e2e/util.go
index ce7289a..3b772c0 100644
--- a/tests/e2e/util.go
+++ b/tests/e2e/util.go
@@ -108,3 +108,12 @@ func closeWithTimeout(p *expect.ExpectProcess, d time.Duration) error {
func toTLS(s string) string {
return strings.Replace(s, "http://", "https://", 1)
}
+
+func curl(endpoint string, method string, curlReq e2e.CURLReq, connType e2e.ClientConnType) (string, error) {
+ args := e2e.CURLPrefixArgs(endpoint, e2e.ClientConfig{ConnectionType: connType}, false, method, curlReq)
+ lines, err := e2e.RunUtilCompletion(args, nil)
+ if err != nil {
+ return "", err
+ }
+ return strings.Join(lines, "\n"), nil
+}
--
2.20.1
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。