mirror of
https://github.com/Ylianst/MeshCentral.git
synced 2025-02-12 11:01:52 +00:00
Added option to check HTTP origin.
This commit is contained in:
parent
5c1249ccca
commit
f2e43cc6da
4 changed files with 29 additions and 1 deletions
|
@ -1134,6 +1134,15 @@
|
|||
"type": "string"
|
||||
}
|
||||
},
|
||||
"allowedOrigin": {
|
||||
"type": [ "array", "boolean" ],
|
||||
"default": false,
|
||||
"uniqueItems": true,
|
||||
"description": "A list of allowed hostnames for HTTP request origin header. If false, a default list is created, if true, all hostnames are allowed.",
|
||||
"items": {
|
||||
"type": "string"
|
||||
}
|
||||
},
|
||||
"welcomeText": {
|
||||
"type": "string",
|
||||
"description": "Text that will be shown on the login screen."
|
||||
|
|
|
@ -1312,6 +1312,7 @@ function CreateMeshCentralServer(config, args) {
|
|||
if (typeof obj.config.domains[i].agentallowedip == 'string') { if (obj.config.domains[i].agentallowedip == '') { delete obj.config.domains[i].agentallowedip; } else { obj.config.domains[i].agentallowedip = obj.config.domains[i].agentallowedip.split(','); } }
|
||||
if (typeof obj.config.domains[i].agentblockedip == 'string') { if (obj.config.domains[i].agentblockedip == '') { delete obj.config.domains[i].agentblockedip; } else { obj.config.domains[i].agentblockedip = obj.config.domains[i].agentblockedip.split(','); } }
|
||||
if (typeof obj.config.domains[i].ignoreagenthashcheck == 'string') { if (obj.config.domains[i].ignoreagenthashcheck == '') { delete obj.config.domains[i].ignoreagenthashcheck; } else { obj.config.domains[i].ignoreagenthashcheck = obj.config.domains[i].ignoreagenthashcheck.split(','); } }
|
||||
if (typeof obj.config.domains[i].allowedorigin == 'string') { if (obj.config.domains[i].allowedorigin == '') { delete obj.config.domains[i].allowedorigin; } else { obj.config.domains[i].allowedorigin = obj.config.domains[i].allowedorigin.split(','); } }
|
||||
if ((obj.config.domains[i].passwordrequirements != null) && (typeof obj.config.domains[i].passwordrequirements == 'object')) {
|
||||
if (typeof obj.config.domains[i].passwordrequirements.skip2factor == 'string') {
|
||||
obj.config.domains[i].passwordrequirements.skip2factor = obj.config.domains[i].passwordrequirements.skip2factor.split(',');
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
<!DOCTYPE html>
|
||||
<!DOCTYPE html>
|
||||
<html lang="en" dir="ltr" xmlns="http://www.w3.org/1999/xhtml">
|
||||
<head>
|
||||
<meta http-equiv="X-UA-Compatible" content="IE=edge" />
|
||||
|
@ -2133,6 +2133,7 @@
|
|||
QV('verifyEmailId2', false);
|
||||
QV('logoutControl', false);
|
||||
if (errorCode == 'noauth') { QH('p0span', "Unable to perform authentication"); return; }
|
||||
if (errorCode == 'invalidorigin') { QH('p0span', "Invalid origin in HTTP request"); return; }
|
||||
if (prevState == 2) { if (autoReconnect) { setTimeout(serverPoll, 5000); } } else { QH('p0span', "Unable to connect web socket"); }
|
||||
if (authCookieRenewTimer != null) { clearInterval(authCookieRenewTimer); authCookieRenewTimer = null; }
|
||||
} else if (state == 2) {
|
||||
|
|
17
webserver.js
17
webserver.js
|
@ -5734,6 +5734,18 @@ module.exports.CreateWebServer = function (parent, db, args, certificates, doneF
|
|||
return obj.certificates.CommonName;
|
||||
}
|
||||
|
||||
// Return true if this is an allowed HTTP request origin hostname.
|
||||
obj.CheckWebServerOriginName = function (domain, req) {
|
||||
if (domain.allowedorigin === true) return true; // Ignore origin
|
||||
if (typeof req.headers.origin != 'string') return true; // No origin in the header, this is a desktop app
|
||||
const originUrl = require('url').parse(req.headers.origin, true);
|
||||
if (typeof originUrl.hostname != 'string') return false; // Origin hostname is not valid
|
||||
if (Array.isArray(domain.allowedorigin)) return (domain.allowedorigin.indexOf(originUrl.hostname) >= 0); // Check if this is an allowed origin from an explicit list
|
||||
if (obj.isTrustedCert(domain) === false) return true; // This server does not have a trusted certificate.
|
||||
if (domain.dns != null) return (domain.dns == originUrl.hostname); // Match the domain DNS
|
||||
return (obj.certificates.CommonName == originUrl.hostname); // Match the default server name
|
||||
}
|
||||
|
||||
// Create a OSX mesh agent installer
|
||||
obj.handleMeshOsxAgentRequest = function (req, res) {
|
||||
const domain = getDomain(req, res);
|
||||
|
@ -6434,6 +6446,11 @@ module.exports.CreateWebServer = function (parent, db, args, certificates, doneF
|
|||
obj.app.ws(url + 'control.ashx', function (ws, req) {
|
||||
getWebsocketArgs(ws, req, function (ws, req) {
|
||||
const domain = getDomain(req);
|
||||
if (obj.CheckWebServerOriginName(domain, req) == false) {
|
||||
try { ws.send(JSON.stringify({ action: 'close', cause: 'invalidorigin', msg: 'invalidorigin' })); } catch (ex) { }
|
||||
try { ws.close(); } catch (ex) { }
|
||||
return;
|
||||
}
|
||||
if ((domain.loginkey != null) && (domain.loginkey.indexOf(req.query.key) == -1)) { ws.close(); return; } // Check 3FA URL key
|
||||
PerformWSSessionAuth(ws, req, true, function (ws1, req1, domain, user, cookie, authData) {
|
||||
if (user == null) { // User is not authenticated, perform inner server authentication
|
||||
|
|
Loading…
Reference in a new issue