Skip to content

Commit dcc23a3

Browse files
committed
Fix security issue with 2fa in recover module
1 parent e74112f commit dcc23a3

File tree

3 files changed

+77
-4
lines changed

3 files changed

+77
-4
lines changed

CHANGELOG.md

+19
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,25 @@
33
The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/)
44
and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html).
55

6+
## [3.2.1] - 2022-10-10
7+
8+
### Security
9+
10+
- Change it such that events are fired around recovery. Some important events
11+
were not occurring despite being logged in that would manage state like
12+
remember cookies, locking state, etc.
13+
14+
A significant side effect of this is that when 2fa is currently turned on on
15+
an account, it could be bypassed by using the Recover functionality with the
16+
`RecoverLoginAfterRecovery` feature which was not otherwise flagged as a
17+
dangerous option.
18+
19+
While it is true that recover uses an email to invoke the flow and therefore
20+
some second factor has been utilizied, it should be considered insecure to
21+
bypass an authenticator or sms verification for any login and therefore
22+
this large change in behavior is being shipped as a security fix (meaning it
23+
becomes a minor change).
24+
625
## [3.2.0] - 2021-08-11
726

827
### Added

recover/recover.go

+25-4
Original file line numberDiff line numberDiff line change
@@ -278,14 +278,35 @@ func (r *Recover) EndPost(w http.ResponseWriter, req *http.Request) error {
278278
}
279279

280280
successMsg := "Successfully updated password"
281+
_, err = r.Authboss.Events.FireAfter(authboss.EventRecoverEnd, w, req)
282+
if err != nil {
283+
return err
284+
}
285+
281286
if r.Authboss.Config.Modules.RecoverLoginAfterRecovery {
287+
handled, err = r.Events.FireBefore(authboss.EventAuth, w, req)
288+
if err != nil {
289+
return err
290+
} else if handled {
291+
return nil
292+
}
293+
294+
handled, err = r.Events.FireBefore(authboss.EventAuthHijack, w, req)
295+
if err != nil {
296+
return err
297+
} else if handled {
298+
return nil
299+
}
300+
282301
authboss.PutSession(w, authboss.SessionKey, user.GetPID())
283302
successMsg += " and logged in"
284-
}
285303

286-
_, err = r.Authboss.Events.FireAfter(authboss.EventRecoverEnd, w, req)
287-
if err != nil {
288-
return err
304+
handled, err = r.Authboss.Events.FireAfter(authboss.EventAuth, w, req)
305+
if err != nil {
306+
return err
307+
} else if handled {
308+
return nil
309+
}
289310
}
290311

291312
ro := authboss.RedirectOptions{

recover/recover_test.go

+33
Original file line numberDiff line numberDiff line change
@@ -276,6 +276,36 @@ func TestEndPostSuccessLogin(t *testing.T) {
276276
RecoverTokenExpiry: time.Now().UTC().AddDate(0, 0, 1),
277277
}
278278

279+
callbacks := 0
280+
h.ab.Events.After(authboss.EventRecoverEnd, func(w http.ResponseWriter, r *http.Request, handled bool) (bool, error) {
281+
if callbacks != 0 {
282+
t.Error("after recover end was not called 1st")
283+
}
284+
callbacks += 1
285+
return false, nil
286+
})
287+
h.ab.Events.Before(authboss.EventAuth, func(w http.ResponseWriter, r *http.Request, handled bool) (bool, error) {
288+
if callbacks != 1 {
289+
t.Error("before auth was not called 2nd")
290+
}
291+
callbacks += 1
292+
return false, nil
293+
})
294+
h.ab.Events.Before(authboss.EventAuthHijack, func(w http.ResponseWriter, r *http.Request, handled bool) (bool, error) {
295+
if callbacks != 2 {
296+
t.Error("before auth hijack was not called 3rd")
297+
}
298+
callbacks += 1
299+
return false, nil
300+
})
301+
h.ab.Events.After(authboss.EventAuth, func(w http.ResponseWriter, r *http.Request, handled bool) (bool, error) {
302+
if callbacks != 3 {
303+
t.Error("after auth was not called 4th")
304+
}
305+
callbacks += 1
306+
return false, nil
307+
})
308+
279309
r := mocks.Request("POST")
280310
w := httptest.NewRecorder()
281311

@@ -295,6 +325,9 @@ func TestEndPostSuccessLogin(t *testing.T) {
295325
if !strings.Contains(h.redirector.Options.Success, "logged in") {
296326
t.Error("should talk about logging in")
297327
}
328+
if callbacks != 4 {
329+
t.Error("all 4 callbacks were not called")
330+
}
298331
}
299332

300333
func TestEndPostValidationFailure(t *testing.T) {

0 commit comments

Comments
 (0)