2023-03-07 17:16:47 +01:00

77 lines
1.8 KiB
Plaintext

== How to fix it in SSH2
=== Code examples
include::../../common/fix/code-rationale.adoc[]
==== Noncompliant code example
[source,javascript,diff-id=1,diff-type=noncompliant]
----
const { Client } = require('ssh2')
const conn = new Client()
conn.on('ready', () => {
conn.exec(req.query.cmd, (err, stream) => {}) // Noncompliant
})
conn.connect({
host: 'example.org',
username: 'user',
password: 'password'
})
----
==== Compliant solution
[source,javascript,diff-id=1,diff-type=compliant]
----
const { Client } = require('ssh2')
const shell = require('shell-escape-tag')
const cmdId = parseInt(req.query.cmdId)
let host = req.query.host
host = typeof host === "string"? host : "example.org"
host = shell.escape(host)
const allowedCommands = ["/bin/ping -c 1 --", "/bin/host --"]
const cmd = `${allowedCommands[cmdId]} ${host}`
const conn = new Client()
conn.on('ready', () => {
conn.exec(cmd, (err, stream) => {})
})
conn.connect({
host: 'example.org',
username: 'user',
password: 'password'
})
----
=== How does this work?
include::../../common/fix/introduction.adoc[]
include::../../common/fix/pre-approved-list.adoc[]
In the example compliant code, a static list of trusted commands is used. Users are only allowed to
submit an index in this array in place of a full command name.
:sanitizationLib: shell-escape-tag
include::../../common/fix/sanitize-meta-characters.adoc[]
In the example compliant code, the `escape` function from the `shell-escape-tag` is used to properly
escape the user-supplied command argument. It can then safely be used in the
trusted command template.
=== Pitfalls
include::../common/pitfalls/loose-typing.adoc[]
In the above compliant code example, the `shell.escape` function has this
behavior. However, a type check has been introduced to prevent any unexpected
issue.