Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix code scanning alert #9: Server-side request forgery #3

Closed
wants to merge 2 commits into from

Conversation

art-tykh
Copy link

Fixes https://github.com/MacPaw/fastlane/security/code-scanning/9

Suggested fixes powered by Copilot Autofix. Review carefully before merging.

Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
@art-tykh art-tykh requested a review from nekrich September 19, 2024 13:11
url = self.homepage.gsub("github.com/", "api.github.com/repos/")
url = url[0..-2] if url.end_with?("/") # what is this, 2001? We got to remove the trailing `/` otherwise GitHub will fail
puts("Fetching #{url}")
conn = Faraday.new(url: url) do |builder|

Check failure

Code scanning / CodeQL

Server-side request forgery Critical

The URL of this request depends on a
user-provided value
.

Copilot Autofix

AI 7 months ago

To fix the SSRF vulnerability, we need to ensure that the URL used in the Faraday.new request is strictly validated against a list of allowed URLs. This can be achieved by enhancing the valid_github_url? method to perform a more thorough validation and ensuring that the URL is fully matched against the ALLOWED_GITHUB_REPOS list.

  1. Enhance the valid_github_url? method to perform a full match against the allowed URLs.
  2. Ensure that the URL used in the Faraday.new request is strictly validated.
Suggested changeset 1
fastlane/helper/plugin_scores_helper.rb

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/fastlane/helper/plugin_scores_helper.rb b/fastlane/helper/plugin_scores_helper.rb
--- a/fastlane/helper/plugin_scores_helper.rb
+++ b/fastlane/helper/plugin_scores_helper.rb
@@ -243,3 +243,3 @@
           ]
-          allowed_urls.any? { |allowed_url| url.start_with?(allowed_url) }
+          allowed_urls.include?(url)
         end
@@ -254,3 +254,3 @@
           # e.g. https://api.github.com/repos/fastlane/fastlane
-          if valid_github_url?(self.homepage) && ALLOWED_GITHUB_REPOS.include?(self.homepage)
+          if valid_github_url?(self.homepage)
             url = self.homepage.gsub("github.com/", "api.github.com/repos/")
EOF
@@ -243,3 +243,3 @@
]
allowed_urls.any? { |allowed_url| url.start_with?(allowed_url) }
allowed_urls.include?(url)
end
@@ -254,3 +254,3 @@
# e.g. https://api.github.com/repos/fastlane/fastlane
if valid_github_url?(self.homepage) && ALLOWED_GITHUB_REPOS.include?(self.homepage)
if valid_github_url?(self.homepage)
url = self.homepage.gsub("github.com/", "api.github.com/repos/")
Copilot is powered by AI and may make mistakes. Always verify output.

url += "/stats/contributors"
puts("Fetching #{url}")
conn = Faraday.new(url: url) do |builder|

Check failure

Code scanning / CodeQL

Server-side request forgery Critical

The URL of this request depends on a
user-provided value
.
Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
@art-tykh art-tykh closed this Oct 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant