-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix code scanning alert #9: Server-side request forgery #3
Conversation
Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
url = self.homepage.gsub("github.com/", "api.github.com/repos/") | ||
url = url[0..-2] if url.end_with?("/") # what is this, 2001? We got to remove the trailing `/` otherwise GitHub will fail | ||
puts("Fetching #{url}") | ||
conn = Faraday.new(url: url) do |builder| |
Check failure
Code scanning / CodeQL
Server-side request forgery Critical
user-provided value
Show autofix suggestion
Hide autofix suggestion
Copilot Autofix
AI 7 months ago
To fix the SSRF vulnerability, we need to ensure that the URL used in the Faraday.new
request is strictly validated against a list of allowed URLs. This can be achieved by enhancing the valid_github_url?
method to perform a more thorough validation and ensuring that the URL is fully matched against the ALLOWED_GITHUB_REPOS
list.
- Enhance the
valid_github_url?
method to perform a full match against the allowed URLs. - Ensure that the URL used in the
Faraday.new
request is strictly validated.
-
Copy modified line R244 -
Copy modified line R255
@@ -243,3 +243,3 @@ | ||
] | ||
allowed_urls.any? { |allowed_url| url.start_with?(allowed_url) } | ||
allowed_urls.include?(url) | ||
end | ||
@@ -254,3 +254,3 @@ | ||
# e.g. https://api.github.com/repos/fastlane/fastlane | ||
if valid_github_url?(self.homepage) && ALLOWED_GITHUB_REPOS.include?(self.homepage) | ||
if valid_github_url?(self.homepage) | ||
url = self.homepage.gsub("github.com/", "api.github.com/repos/") |
|
||
url += "/stats/contributors" | ||
puts("Fetching #{url}") | ||
conn = Faraday.new(url: url) do |builder| |
Check failure
Code scanning / CodeQL
Server-side request forgery Critical
user-provided value
Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
Fixes https://github.com/MacPaw/fastlane/security/code-scanning/9
Suggested fixes powered by Copilot Autofix. Review carefully before merging.