mirror of
https://github.com/django/django.git
synced 2025-03-12 18:30:48 +00:00
Fixed CVE-2024-56374 -- Mitigated potential DoS in IPv6 validation.
Thanks Saravana Kumar for the report, and Sarah Boyce and Mariusz Felisiak for the reviews. Co-authored-by: Natalia <124304+nessita@users.noreply.github.com>
This commit is contained in:
parent
9a2dd9789a
commit
ca2be7724e
@ -32,7 +32,7 @@ from django.utils.dateparse import (
|
|||||||
)
|
)
|
||||||
from django.utils.duration import duration_microseconds, duration_string
|
from django.utils.duration import duration_microseconds, duration_string
|
||||||
from django.utils.functional import Promise, cached_property
|
from django.utils.functional import Promise, cached_property
|
||||||
from django.utils.ipv6 import clean_ipv6_address
|
from django.utils.ipv6 import MAX_IPV6_ADDRESS_LENGTH, clean_ipv6_address
|
||||||
from django.utils.text import capfirst
|
from django.utils.text import capfirst
|
||||||
from django.utils.translation import gettext_lazy as _
|
from django.utils.translation import gettext_lazy as _
|
||||||
|
|
||||||
@ -2233,7 +2233,7 @@ class GenericIPAddressField(Field):
|
|||||||
self.default_validators = validators.ip_address_validators(
|
self.default_validators = validators.ip_address_validators(
|
||||||
protocol, unpack_ipv4
|
protocol, unpack_ipv4
|
||||||
)
|
)
|
||||||
kwargs["max_length"] = 39
|
kwargs["max_length"] = MAX_IPV6_ADDRESS_LENGTH
|
||||||
super().__init__(verbose_name, name, *args, **kwargs)
|
super().__init__(verbose_name, name, *args, **kwargs)
|
||||||
|
|
||||||
def check(self, **kwargs):
|
def check(self, **kwargs):
|
||||||
@ -2260,7 +2260,7 @@ class GenericIPAddressField(Field):
|
|||||||
kwargs["unpack_ipv4"] = self.unpack_ipv4
|
kwargs["unpack_ipv4"] = self.unpack_ipv4
|
||||||
if self.protocol != "both":
|
if self.protocol != "both":
|
||||||
kwargs["protocol"] = self.protocol
|
kwargs["protocol"] = self.protocol
|
||||||
if kwargs.get("max_length") == 39:
|
if kwargs.get("max_length") == self.max_length:
|
||||||
del kwargs["max_length"]
|
del kwargs["max_length"]
|
||||||
return name, path, args, kwargs
|
return name, path, args, kwargs
|
||||||
|
|
||||||
|
@ -46,7 +46,7 @@ from django.utils.choices import normalize_choices
|
|||||||
from django.utils.dateparse import parse_datetime, parse_duration
|
from django.utils.dateparse import parse_datetime, parse_duration
|
||||||
from django.utils.deprecation import RemovedInDjango60Warning
|
from django.utils.deprecation import RemovedInDjango60Warning
|
||||||
from django.utils.duration import duration_string
|
from django.utils.duration import duration_string
|
||||||
from django.utils.ipv6 import clean_ipv6_address
|
from django.utils.ipv6 import MAX_IPV6_ADDRESS_LENGTH, clean_ipv6_address
|
||||||
from django.utils.regex_helper import _lazy_re_compile
|
from django.utils.regex_helper import _lazy_re_compile
|
||||||
from django.utils.translation import gettext_lazy as _
|
from django.utils.translation import gettext_lazy as _
|
||||||
from django.utils.translation import ngettext_lazy
|
from django.utils.translation import ngettext_lazy
|
||||||
@ -1303,6 +1303,7 @@ class GenericIPAddressField(CharField):
|
|||||||
self.default_validators = validators.ip_address_validators(
|
self.default_validators = validators.ip_address_validators(
|
||||||
protocol, unpack_ipv4
|
protocol, unpack_ipv4
|
||||||
)
|
)
|
||||||
|
kwargs.setdefault("max_length", MAX_IPV6_ADDRESS_LENGTH)
|
||||||
super().__init__(**kwargs)
|
super().__init__(**kwargs)
|
||||||
|
|
||||||
def to_python(self, value):
|
def to_python(self, value):
|
||||||
@ -1310,7 +1311,9 @@ class GenericIPAddressField(CharField):
|
|||||||
return ""
|
return ""
|
||||||
value = value.strip()
|
value = value.strip()
|
||||||
if value and ":" in value:
|
if value and ":" in value:
|
||||||
return clean_ipv6_address(value, self.unpack_ipv4)
|
return clean_ipv6_address(
|
||||||
|
value, self.unpack_ipv4, max_length=self.max_length
|
||||||
|
)
|
||||||
return value
|
return value
|
||||||
|
|
||||||
|
|
||||||
|
@ -3,9 +3,22 @@ import ipaddress
|
|||||||
from django.core.exceptions import ValidationError
|
from django.core.exceptions import ValidationError
|
||||||
from django.utils.translation import gettext_lazy as _
|
from django.utils.translation import gettext_lazy as _
|
||||||
|
|
||||||
|
MAX_IPV6_ADDRESS_LENGTH = 39
|
||||||
|
|
||||||
|
|
||||||
|
def _ipv6_address_from_str(ip_str, max_length=MAX_IPV6_ADDRESS_LENGTH):
|
||||||
|
if len(ip_str) > max_length:
|
||||||
|
raise ValueError(
|
||||||
|
f"Unable to convert {ip_str} to an IPv6 address (value too long)."
|
||||||
|
)
|
||||||
|
return ipaddress.IPv6Address(int(ipaddress.IPv6Address(ip_str)))
|
||||||
|
|
||||||
|
|
||||||
def clean_ipv6_address(
|
def clean_ipv6_address(
|
||||||
ip_str, unpack_ipv4=False, error_message=_("This is not a valid IPv6 address.")
|
ip_str,
|
||||||
|
unpack_ipv4=False,
|
||||||
|
error_message=_("This is not a valid IPv6 address."),
|
||||||
|
max_length=MAX_IPV6_ADDRESS_LENGTH,
|
||||||
):
|
):
|
||||||
"""
|
"""
|
||||||
Clean an IPv6 address string.
|
Clean an IPv6 address string.
|
||||||
@ -24,7 +37,7 @@ def clean_ipv6_address(
|
|||||||
Return a compressed IPv6 address or the same value.
|
Return a compressed IPv6 address or the same value.
|
||||||
"""
|
"""
|
||||||
try:
|
try:
|
||||||
addr = ipaddress.IPv6Address(int(ipaddress.IPv6Address(ip_str)))
|
addr = _ipv6_address_from_str(ip_str, max_length)
|
||||||
except ValueError:
|
except ValueError:
|
||||||
raise ValidationError(
|
raise ValidationError(
|
||||||
error_message, code="invalid", params={"protocol": _("IPv6")}
|
error_message, code="invalid", params={"protocol": _("IPv6")}
|
||||||
@ -43,7 +56,7 @@ def is_valid_ipv6_address(ip_str):
|
|||||||
Return whether or not the `ip_str` string is a valid IPv6 address.
|
Return whether or not the `ip_str` string is a valid IPv6 address.
|
||||||
"""
|
"""
|
||||||
try:
|
try:
|
||||||
ipaddress.IPv6Address(ip_str)
|
_ipv6_address_from_str(ip_str)
|
||||||
except ValueError:
|
except ValueError:
|
||||||
return False
|
return False
|
||||||
return True
|
return True
|
||||||
|
@ -761,7 +761,7 @@ For each field, we describe the default widget used if you don't specify
|
|||||||
* Empty value: ``''`` (an empty string)
|
* Empty value: ``''`` (an empty string)
|
||||||
* Normalizes to: A string. IPv6 addresses are normalized as described below.
|
* Normalizes to: A string. IPv6 addresses are normalized as described below.
|
||||||
* Validates that the given value is a valid IP address.
|
* Validates that the given value is a valid IP address.
|
||||||
* Error message keys: ``required``, ``invalid``
|
* Error message keys: ``required``, ``invalid``, ``max_length``
|
||||||
|
|
||||||
The IPv6 address normalization follows :rfc:`4291#section-2.2` section 2.2,
|
The IPv6 address normalization follows :rfc:`4291#section-2.2` section 2.2,
|
||||||
including using the IPv4 format suggested in paragraph 3 of that section, like
|
including using the IPv4 format suggested in paragraph 3 of that section, like
|
||||||
@ -769,7 +769,7 @@ For each field, we describe the default widget used if you don't specify
|
|||||||
``2001::1``, and ``::ffff:0a0a:0a0a`` to ``::ffff:10.10.10.10``. All characters
|
``2001::1``, and ``::ffff:0a0a:0a0a`` to ``::ffff:10.10.10.10``. All characters
|
||||||
are converted to lowercase.
|
are converted to lowercase.
|
||||||
|
|
||||||
Takes two optional arguments:
|
Takes three optional arguments:
|
||||||
|
|
||||||
.. attribute:: protocol
|
.. attribute:: protocol
|
||||||
|
|
||||||
@ -784,6 +784,15 @@ For each field, we describe the default widget used if you don't specify
|
|||||||
``192.0.2.1``. Default is disabled. Can only be used
|
``192.0.2.1``. Default is disabled. Can only be used
|
||||||
when ``protocol`` is set to ``'both'``.
|
when ``protocol`` is set to ``'both'``.
|
||||||
|
|
||||||
|
.. attribute:: max_length
|
||||||
|
|
||||||
|
Defaults to 39, and behaves the same way as it does for
|
||||||
|
:class:`CharField`.
|
||||||
|
|
||||||
|
.. versionchanged:: 4.2.18
|
||||||
|
|
||||||
|
The default value for ``max_length`` was set to 39 characters.
|
||||||
|
|
||||||
``ImageField``
|
``ImageField``
|
||||||
--------------
|
--------------
|
||||||
|
|
||||||
|
@ -5,3 +5,15 @@ Django 4.2.18 release notes
|
|||||||
*January 14, 2025*
|
*January 14, 2025*
|
||||||
|
|
||||||
Django 4.2.18 fixes a security issue with severity "moderate" in 4.2.17.
|
Django 4.2.18 fixes a security issue with severity "moderate" in 4.2.17.
|
||||||
|
|
||||||
|
CVE-2024-56374: Potential denial-of-service vulnerability in IPv6 validation
|
||||||
|
============================================================================
|
||||||
|
|
||||||
|
Lack of upper bound limit enforcement in strings passed when performing IPv6
|
||||||
|
validation could lead to a potential denial-of-service attack. The undocumented
|
||||||
|
and private functions ``clean_ipv6_address`` and ``is_valid_ipv6_address`` were
|
||||||
|
vulnerable, as was the :class:`django.forms.GenericIPAddressField` form field,
|
||||||
|
which has now been updated to define a ``max_length`` of 39 characters.
|
||||||
|
|
||||||
|
The :class:`django.db.models.GenericIPAddressField` model field was not
|
||||||
|
affected.
|
||||||
|
@ -5,3 +5,15 @@ Django 5.0.11 release notes
|
|||||||
*January 14, 2025*
|
*January 14, 2025*
|
||||||
|
|
||||||
Django 5.0.11 fixes a security issue with severity "moderate" in 5.0.10.
|
Django 5.0.11 fixes a security issue with severity "moderate" in 5.0.10.
|
||||||
|
|
||||||
|
CVE-2024-56374: Potential denial-of-service vulnerability in IPv6 validation
|
||||||
|
============================================================================
|
||||||
|
|
||||||
|
Lack of upper bound limit enforcement in strings passed when performing IPv6
|
||||||
|
validation could lead to a potential denial-of-service attack. The undocumented
|
||||||
|
and private functions ``clean_ipv6_address`` and ``is_valid_ipv6_address`` were
|
||||||
|
vulnerable, as was the :class:`django.forms.GenericIPAddressField` form field,
|
||||||
|
which has now been updated to define a ``max_length`` of 39 characters.
|
||||||
|
|
||||||
|
The :class:`django.db.models.GenericIPAddressField` model field was not
|
||||||
|
affected.
|
||||||
|
@ -7,6 +7,18 @@ Django 5.1.5 release notes
|
|||||||
Django 5.1.5 fixes a security issue with severity "moderate" and one bug in
|
Django 5.1.5 fixes a security issue with severity "moderate" and one bug in
|
||||||
5.1.4.
|
5.1.4.
|
||||||
|
|
||||||
|
CVE-2024-56374: Potential denial-of-service vulnerability in IPv6 validation
|
||||||
|
============================================================================
|
||||||
|
|
||||||
|
Lack of upper bound limit enforcement in strings passed when performing IPv6
|
||||||
|
validation could lead to a potential denial-of-service attack. The undocumented
|
||||||
|
and private functions ``clean_ipv6_address`` and ``is_valid_ipv6_address`` were
|
||||||
|
vulnerable, as was the :class:`django.forms.GenericIPAddressField` form field,
|
||||||
|
which has now been updated to define a ``max_length`` of 39 characters.
|
||||||
|
|
||||||
|
The :class:`django.db.models.GenericIPAddressField` model field was not
|
||||||
|
affected.
|
||||||
|
|
||||||
Bugfixes
|
Bugfixes
|
||||||
========
|
========
|
||||||
|
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
from django.core.exceptions import ValidationError
|
from django.core.exceptions import ValidationError
|
||||||
from django.forms import GenericIPAddressField
|
from django.forms import GenericIPAddressField
|
||||||
from django.test import SimpleTestCase
|
from django.test import SimpleTestCase
|
||||||
|
from django.utils.ipv6 import MAX_IPV6_ADDRESS_LENGTH
|
||||||
|
|
||||||
|
|
||||||
class GenericIPAddressFieldTest(SimpleTestCase):
|
class GenericIPAddressFieldTest(SimpleTestCase):
|
||||||
@ -125,6 +126,35 @@ class GenericIPAddressFieldTest(SimpleTestCase):
|
|||||||
):
|
):
|
||||||
f.clean("1:2")
|
f.clean("1:2")
|
||||||
|
|
||||||
|
def test_generic_ipaddress_max_length_custom(self):
|
||||||
|
# Valid IPv4-mapped IPv6 address, len 45.
|
||||||
|
addr = "0000:0000:0000:0000:0000:ffff:192.168.100.228"
|
||||||
|
f = GenericIPAddressField(max_length=len(addr))
|
||||||
|
f.clean(addr)
|
||||||
|
|
||||||
|
def test_generic_ipaddress_max_length_validation_error(self):
|
||||||
|
# Valid IPv4-mapped IPv6 address, len 45.
|
||||||
|
addr = "0000:0000:0000:0000:0000:ffff:192.168.100.228"
|
||||||
|
|
||||||
|
cases = [
|
||||||
|
({}, MAX_IPV6_ADDRESS_LENGTH), # Default value.
|
||||||
|
({"max_length": len(addr) - 1}, len(addr) - 1),
|
||||||
|
]
|
||||||
|
for kwargs, max_length in cases:
|
||||||
|
max_length_plus_one = max_length + 1
|
||||||
|
msg = (
|
||||||
|
f"Ensure this value has at most {max_length} characters (it has "
|
||||||
|
f"{max_length_plus_one}).'"
|
||||||
|
)
|
||||||
|
with self.subTest(max_length=max_length):
|
||||||
|
f = GenericIPAddressField(**kwargs)
|
||||||
|
with self.assertRaisesMessage(ValidationError, msg):
|
||||||
|
f.clean("x" * max_length_plus_one)
|
||||||
|
with self.assertRaisesMessage(
|
||||||
|
ValidationError, "This is not a valid IPv6 address."
|
||||||
|
):
|
||||||
|
f.clean(addr)
|
||||||
|
|
||||||
def test_generic_ipaddress_as_generic_not_required(self):
|
def test_generic_ipaddress_as_generic_not_required(self):
|
||||||
f = GenericIPAddressField(required=False)
|
f = GenericIPAddressField(required=False)
|
||||||
self.assertEqual(f.clean(""), "")
|
self.assertEqual(f.clean(""), "")
|
||||||
@ -150,7 +180,8 @@ class GenericIPAddressFieldTest(SimpleTestCase):
|
|||||||
f.clean(" fe80::223:6cff:fe8a:2e8a "), "fe80::223:6cff:fe8a:2e8a"
|
f.clean(" fe80::223:6cff:fe8a:2e8a "), "fe80::223:6cff:fe8a:2e8a"
|
||||||
)
|
)
|
||||||
self.assertEqual(
|
self.assertEqual(
|
||||||
f.clean(" 2a02::223:6cff:fe8a:2e8a "), "2a02::223:6cff:fe8a:2e8a"
|
f.clean(" " * MAX_IPV6_ADDRESS_LENGTH + " 2a02::223:6cff:fe8a:2e8a "),
|
||||||
|
"2a02::223:6cff:fe8a:2e8a",
|
||||||
)
|
)
|
||||||
with self.assertRaisesMessage(
|
with self.assertRaisesMessage(
|
||||||
ValidationError, "'This is not a valid IPv6 address.'"
|
ValidationError, "'This is not a valid IPv6 address.'"
|
||||||
|
@ -1,9 +1,16 @@
|
|||||||
import unittest
|
import traceback
|
||||||
|
from io import StringIO
|
||||||
|
|
||||||
from django.utils.ipv6 import clean_ipv6_address, is_valid_ipv6_address
|
from django.core.exceptions import ValidationError
|
||||||
|
from django.test import SimpleTestCase
|
||||||
|
from django.utils.ipv6 import (
|
||||||
|
MAX_IPV6_ADDRESS_LENGTH,
|
||||||
|
clean_ipv6_address,
|
||||||
|
is_valid_ipv6_address,
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
class TestUtilsIPv6(unittest.TestCase):
|
class TestUtilsIPv6(SimpleTestCase):
|
||||||
def test_validates_correct_plain_address(self):
|
def test_validates_correct_plain_address(self):
|
||||||
self.assertTrue(is_valid_ipv6_address("fe80::223:6cff:fe8a:2e8a"))
|
self.assertTrue(is_valid_ipv6_address("fe80::223:6cff:fe8a:2e8a"))
|
||||||
self.assertTrue(is_valid_ipv6_address("2a02::223:6cff:fe8a:2e8a"))
|
self.assertTrue(is_valid_ipv6_address("2a02::223:6cff:fe8a:2e8a"))
|
||||||
@ -64,3 +71,21 @@ class TestUtilsIPv6(unittest.TestCase):
|
|||||||
self.assertEqual(
|
self.assertEqual(
|
||||||
clean_ipv6_address("::ffff:18.52.18.52", unpack_ipv4=True), "18.52.18.52"
|
clean_ipv6_address("::ffff:18.52.18.52", unpack_ipv4=True), "18.52.18.52"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
def test_address_too_long(self):
|
||||||
|
addresses = [
|
||||||
|
"0000:0000:0000:0000:0000:ffff:192.168.100.228", # IPv4-mapped IPv6 address
|
||||||
|
"0000:0000:0000:0000:0000:ffff:192.168.100.228%123456", # % scope/zone
|
||||||
|
"fe80::223:6cff:fe8a:2e8a:1234:5678:00000", # MAX_IPV6_ADDRESS_LENGTH + 1
|
||||||
|
]
|
||||||
|
msg = "This is the error message."
|
||||||
|
value_error_msg = "Unable to convert %s to an IPv6 address (value too long)."
|
||||||
|
for addr in addresses:
|
||||||
|
with self.subTest(addr=addr):
|
||||||
|
self.assertGreater(len(addr), MAX_IPV6_ADDRESS_LENGTH)
|
||||||
|
self.assertEqual(is_valid_ipv6_address(addr), False)
|
||||||
|
with self.assertRaisesMessage(ValidationError, msg) as ctx:
|
||||||
|
clean_ipv6_address(addr, error_message=msg)
|
||||||
|
exception_traceback = StringIO()
|
||||||
|
traceback.print_exception(ctx.exception, file=exception_traceback)
|
||||||
|
self.assertIn(value_error_msg % addr, exception_traceback.getvalue())
|
||||||
|
Loading…
x
Reference in New Issue
Block a user