Skip to content

Commit ed1be4c

Browse files
authored
Handle base64 decoding correctly to avoid panic (#26483)
Fix the panic if the "base64 secret" is too long.
1 parent cafce3b commit ed1be4c

File tree

8 files changed

+43
-30
lines changed

8 files changed

+43
-30
lines changed

cmd/generate.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -70,12 +70,12 @@ func runGenerateInternalToken(c *cli.Context) error {
7070
}
7171

7272
func runGenerateLfsJwtSecret(c *cli.Context) error {
73-
JWTSecretBase64, err := generate.NewJwtSecretBase64()
73+
_, jwtSecretBase64, err := generate.NewJwtSecretBase64()
7474
if err != nil {
7575
return err
7676
}
7777

78-
fmt.Printf("%s", JWTSecretBase64)
78+
fmt.Printf("%s", jwtSecretBase64)
7979

8080
if isatty.IsTerminal(os.Stdout.Fd()) {
8181
fmt.Printf("\n")

modules/generate/generate.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -49,12 +49,12 @@ func NewJwtSecret() ([]byte, error) {
4949
}
5050

5151
// NewJwtSecretBase64 generates a new base64 encoded value intended to be used for JWT secrets.
52-
func NewJwtSecretBase64() (string, error) {
52+
func NewJwtSecretBase64() ([]byte, string, error) {
5353
bytes, err := NewJwtSecret()
5454
if err != nil {
55-
return "", err
55+
return nil, "", err
5656
}
57-
return base64.RawURLEncoding.EncodeToString(bytes), nil
57+
return bytes, base64.RawURLEncoding.EncodeToString(bytes), nil
5858
}
5959

6060
// NewSecretKey generate a new value intended to be used by SECRET_KEY.

modules/setting/lfs.go

+5-7
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ import (
99
"time"
1010

1111
"code.gitea.io/gitea/modules/generate"
12+
"code.gitea.io/gitea/modules/util"
1213
)
1314

1415
// LFS represents the configuration for Git LFS
@@ -56,17 +57,14 @@ func loadLFSFrom(rootCfg ConfigProvider) error {
5657

5758
LFS.HTTPAuthExpiry = sec.Key("LFS_HTTP_AUTH_EXPIRY").MustDuration(24 * time.Hour)
5859

59-
if !LFS.StartServer {
60+
if !LFS.StartServer || !InstallLock {
6061
return nil
6162
}
6263

6364
LFS.JWTSecretBase64 = loadSecret(rootCfg.Section("server"), "LFS_JWT_SECRET_URI", "LFS_JWT_SECRET")
64-
65-
LFS.JWTSecretBytes = make([]byte, 32)
66-
n, err := base64.RawURLEncoding.Decode(LFS.JWTSecretBytes, []byte(LFS.JWTSecretBase64))
67-
68-
if (err != nil || n != 32) && InstallLock {
69-
LFS.JWTSecretBase64, err = generate.NewJwtSecretBase64()
65+
LFS.JWTSecretBytes, err = util.Base64FixedDecode(base64.RawURLEncoding, []byte(LFS.JWTSecretBase64), 32)
66+
if err != nil {
67+
LFS.JWTSecretBytes, LFS.JWTSecretBase64, err = generate.NewJwtSecretBase64()
7068
if err != nil {
7169
return fmt.Errorf("error generating JWT Secret for custom config: %v", err)
7270
}

modules/setting/oauth2.go

+6-7
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ import (
1010

1111
"code.gitea.io/gitea/modules/generate"
1212
"code.gitea.io/gitea/modules/log"
13+
"code.gitea.io/gitea/modules/util"
1314
)
1415

1516
// OAuth2UsernameType is enum describing the way gitea 'name' should be generated from oauth2 data
@@ -129,21 +130,19 @@ func loadOAuth2From(rootCfg ConfigProvider) {
129130
}
130131

131132
if InstallLock {
132-
key := make([]byte, 32)
133-
n, err := base64.RawURLEncoding.Decode(key, []byte(OAuth2.JWTSecretBase64))
134-
if err != nil || n != 32 {
135-
key, err = generate.NewJwtSecret()
133+
if _, err := util.Base64FixedDecode(base64.RawURLEncoding, []byte(OAuth2.JWTSecretBase64), 32); err != nil {
134+
key, err := generate.NewJwtSecret()
136135
if err != nil {
137136
log.Fatal("error generating JWT secret: %v", err)
138137
}
139138

140-
secretBase64 := base64.RawURLEncoding.EncodeToString(key)
139+
OAuth2.JWTSecretBase64 = base64.RawURLEncoding.EncodeToString(key)
141140
saveCfg, err := rootCfg.PrepareSaving()
142141
if err != nil {
143142
log.Fatal("save oauth2.JWT_SECRET failed: %v", err)
144143
}
145-
rootCfg.Section("oauth2").Key("JWT_SECRET").SetValue(secretBase64)
146-
saveCfg.Section("oauth2").Key("JWT_SECRET").SetValue(secretBase64)
144+
rootCfg.Section("oauth2").Key("JWT_SECRET").SetValue(OAuth2.JWTSecretBase64)
145+
saveCfg.Section("oauth2").Key("JWT_SECRET").SetValue(OAuth2.JWTSecretBase64)
147146
if err := saveCfg.Save(); err != nil {
148147
log.Fatal("save oauth2.JWT_SECRET failed: %v", err)
149148
}

modules/util/util.go

+11
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ package util
66
import (
77
"bytes"
88
"crypto/rand"
9+
"encoding/base64"
910
"fmt"
1011
"math/big"
1112
"strconv"
@@ -261,3 +262,13 @@ func ToFloat64(number any) (float64, error) {
261262
func ToPointer[T any](val T) *T {
262263
return &val
263264
}
265+
266+
func Base64FixedDecode(encoding *base64.Encoding, src []byte, length int) ([]byte, error) {
267+
decoded := make([]byte, encoding.DecodedLen(len(src))+3)
268+
if n, err := encoding.Decode(decoded, src); err != nil {
269+
return nil, err
270+
} else if n != length {
271+
return nil, fmt.Errorf("invalid base64 decoded length: %d, expects: %d", n, length)
272+
}
273+
return decoded[:length], nil
274+
}

modules/util/util_test.go

+14
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
package util
55

66
import (
7+
"encoding/base64"
78
"regexp"
89
"strings"
910
"testing"
@@ -233,3 +234,16 @@ func TestToPointer(t *testing.T) {
233234
val123 := 123
234235
assert.False(t, &val123 == ToPointer(val123))
235236
}
237+
238+
func TestBase64FixedDecode(t *testing.T) {
239+
_, err := Base64FixedDecode(base64.RawURLEncoding, []byte("abcd"), 32)
240+
assert.ErrorContains(t, err, "invalid base64 decoded length")
241+
_, err = Base64FixedDecode(base64.RawURLEncoding, []byte(strings.Repeat("a", 64)), 32)
242+
assert.ErrorContains(t, err, "invalid base64 decoded length")
243+
244+
str32 := strings.Repeat("x", 32)
245+
encoded32 := base64.RawURLEncoding.EncodeToString([]byte(str32))
246+
decoded32, err := Base64FixedDecode(base64.RawURLEncoding, []byte(encoded32), 32)
247+
assert.NoError(t, err)
248+
assert.Equal(t, str32, string(decoded32))
249+
}

routers/install/install.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -415,7 +415,7 @@ func SubmitInstall(ctx *context.Context) {
415415
cfg.Section("server").Key("LFS_START_SERVER").SetValue("true")
416416
cfg.Section("lfs").Key("PATH").SetValue(form.LFSRootPath)
417417
var lfsJwtSecret string
418-
if lfsJwtSecret, err = generate.NewJwtSecretBase64(); err != nil {
418+
if _, lfsJwtSecret, err = generate.NewJwtSecretBase64(); err != nil {
419419
ctx.RenderWithErr(ctx.Tr("install.lfs_jwt_secret_failed", err), tplInstall, &form)
420420
return
421421
}

services/auth/source/oauth2/jwtsigningkey.go

+1-10
Original file line numberDiff line numberDiff line change
@@ -336,16 +336,7 @@ func InitSigningKey() error {
336336
// loadSymmetricKey checks if the configured secret is valid.
337337
// If it is not valid, it will return an error.
338338
func loadSymmetricKey() (any, error) {
339-
key := make([]byte, 32)
340-
n, err := base64.RawURLEncoding.Decode(key, []byte(setting.OAuth2.JWTSecretBase64))
341-
if err != nil {
342-
return nil, err
343-
}
344-
if n != 32 {
345-
return nil, fmt.Errorf("JWT secret must be 32 bytes long")
346-
}
347-
348-
return key, nil
339+
return util.Base64FixedDecode(base64.RawURLEncoding, []byte(setting.OAuth2.JWTSecretBase64), 32)
349340
}
350341

351342
// loadOrCreateAsymmetricKey checks if the configured private key exists.

0 commit comments

Comments
 (0)