com.zimbra.cs.servlet.CsrfFilter.java Source code

Java tutorial

Introduction

Here is the source code for com.zimbra.cs.servlet.CsrfFilter.java

Source

/*
 * ***** BEGIN LICENSE BLOCK *****
 * Zimbra Collaboration Suite Server
 * Copyright (C) 2013, 2014, 2015, 2016 Synacor, Inc.
 *
 * This program is free software: you can redistribute it and/or modify it under
 * the terms of the GNU General Public License as published by the Free Software Foundation,
 * version 2 of the License.
 *
 * This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
 * without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
 * See the GNU General Public License for more details.
 * You should have received a copy of the GNU General Public License along with this program.
 * If not, see <https://www.gnu.org/licenses/>.
 * ***** END LICENSE BLOCK *****
 */

package com.zimbra.cs.servlet;

import java.io.IOException;
import java.net.MalformedURLException;
import java.util.Arrays;
import java.util.Enumeration;
import java.util.List;
import java.util.Random;

import javax.servlet.Filter;
import javax.servlet.FilterChain;
import javax.servlet.FilterConfig;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;

import com.google.common.base.Joiner;
import com.google.common.net.HttpHeaders;
import com.zimbra.common.service.ServiceException;
import com.zimbra.common.util.StringUtil;
import com.zimbra.common.util.ZimbraLog;
import com.zimbra.cs.account.AuthToken;
import com.zimbra.cs.account.CsrfTokenKey;
import com.zimbra.cs.account.Provisioning;
import com.zimbra.cs.servlet.util.CsrfUtil;
import com.zimbra.soap.RequestContext;

/**
 * @author zimbra
 *
 */
public class CsrfFilter implements Filter {

    /**
     *
     */
    public static final String CSRF_SALT = "CSRF_SALT";
    private String[] allowedRefHosts = null;
    public static final String AUTH_TOKEN = "AuthToken";
    public static final String CSRF_TOKEN_CHECK = "CsrfTokenCheck";
    protected int maxCsrfTokenValidityInMs;
    private Random nonceGen = null;

    /*
     * (non-Javadoc)
     *
     * @see javax.servlet.Filter#init(javax.servlet.FilterConfig)
     */
    @Override
    public void init(FilterConfig filterConfig) throws ServletException {
        // Initialize the parameters related to CSRF check
        Provisioning prov = Provisioning.getInstance();
        try {
            this.allowedRefHosts = prov.getConfig().getCsrfAllowedRefererHosts();
            nonceGen = new Random();
            CsrfTokenKey.getCurrentKey();
            if (ZimbraLog.misc.isInfoEnabled()) {
                ZimbraLog.misc.info("CSRF filter was initialized: " + "CSRFAllowedRefHost: ["
                        + Joiner.on(", ").join(this.allowedRefHosts) + "]");
            }
        } catch (ServiceException e) {
            throw new ServletException("Error initializing CSRF filter: " + e.getMessage(), e);
        }

    }

    /*
     * (non-Javadoc)
     *
     * @see javax.servlet.Filter#destroy()
     */
    @Override
    public void destroy() {

        ZimbraLog.filter.info("Destroying CSRF filter.");

    }

    /*
     * (non-Javadoc)
     *
     * @see javax.servlet.Filter#doFilter(javax.servlet.ServletRequest,
     * javax.servlet.ServletResponse, javax.servlet.FilterChain)
     */
    @Override
    public void doFilter(ServletRequest request, ServletResponse response, FilterChain chain)
            throws IOException, ServletException {
        ZimbraLog.clearContext();

        HttpServletRequest req = (HttpServletRequest) request;
        HttpServletResponse resp = (HttpServletResponse) response;
        req.setAttribute(CSRF_SALT, nonceGen.nextInt() + 1);

        if (ZimbraLog.misc.isDebugEnabled()) {
            ZimbraLog.misc.debug("CSRF Request URI: " + req.getRequestURI());
        }

        boolean csrfCheckEnabled = Boolean.FALSE;
        boolean csrfRefererCheckEnabled = Boolean.FALSE;
        Provisioning prov = Provisioning.getInstance();
        try {
            csrfCheckEnabled = prov.getConfig().isCsrfTokenCheckEnabled();
            csrfRefererCheckEnabled = prov.getConfig().isCsrfRefererCheckEnabled();
        } catch (ServiceException e) {
            ZimbraLog.misc.info("Error in CSRF filter." + e.getMessage(), e);
        }

        if (ZimbraLog.misc.isDebugEnabled()) {
            ZimbraLog.misc.debug("CSRF filter was initialized : " + "CSRFcheck enabled: " + csrfCheckEnabled
                    + "CSRF referer check enabled: " + csrfRefererCheckEnabled + ", CSRFAllowedRefHost: ["
                    + Joiner.on(", ").join(this.allowedRefHosts) + "]" + ", CSRFTokenValidity "
                    + this.maxCsrfTokenValidityInMs + "ms.");
        }

        if (ZimbraLog.misc.isTraceEnabled()) {
            Enumeration<String> hdrNames = req.getHeaderNames();
            ZimbraLog.misc.trace("Soap request headers.");
            while (hdrNames.hasMoreElements()) {
                String name = hdrNames.nextElement();
                // we do not want to print cookie headers for security reasons.
                if (name.contains(HttpHeaders.COOKIE))
                    continue;
                ZimbraLog.misc.trace(name + "=" + req.getHeader(name));
            }
        }

        if (csrfRefererCheckEnabled) {
            if (!allowReqBasedOnRefererHeaderCheck(req)) {
                ZimbraLog.misc.info("CSRF referer check failed");
                resp.sendError(HttpServletResponse.SC_FORBIDDEN);
                return;
            }
        }

        if (!csrfCheckEnabled) {
            req.setAttribute(CSRF_TOKEN_CHECK, Boolean.FALSE);
            chain.doFilter(req, resp);
        } else {
            req.setAttribute(Provisioning.A_zimbraCsrfTokenCheckEnabled, Boolean.TRUE);
            AuthToken authToken = CsrfUtil.getAuthTokenFromReq(req);
            if (CsrfUtil.doCsrfCheck(req, authToken)) {
                // post request and Auth token is CSRF enabled
                req.setAttribute(CSRF_TOKEN_CHECK, Boolean.TRUE);
            } else {
                req.setAttribute(CSRF_TOKEN_CHECK, Boolean.FALSE);
                ZimbraLog.misc.debug("CSRF check will not be done for URI : %s", req.getRequestURI());
            }
            chain.doFilter(req, resp);
        }

        try {
            // We need virtual host information in DefangFilter
            // Set them in ThreadLocal here
            RequestContext reqCtxt = new RequestContext();
            String host = CsrfUtil.getRequestHost(req);
            reqCtxt.setVirtualHost(host);
            ZThreadLocal.setContext(reqCtxt);

        } finally {
            // Unset the variables set in thread local
            ZThreadLocal.unset();
        }

    }

    /**
     * @param initParameter
     * @return
     */
    protected static List<String> convertToList(String urlList) {
        List<String> urls = null;
        if (!StringUtil.isNullOrEmpty(urlList)) {
            String[] temp = urlList.split(",");
            for (int i = 0; i < temp.length; ++i) {
                temp[i] = temp[i].toLowerCase();
            }
            urls = Arrays.asList(temp);
        }
        return urls;
    }

    private boolean allowReqBasedOnRefererHeaderCheck(HttpServletRequest req) {

        try {
            if (CsrfUtil.isCsrfRequestBasedOnReferrer(req, allowedRefHosts)) {
                return false;
            }
        } catch (MalformedURLException e) {
            ZimbraLog.misc.info("Error while doing referer based check." + e.getMessage());
            return false;
        }
        return true;

    }

}