Răsfoiți Sursa

Fix 2FA/sign-in token sessions being valid after password change (#14802)

If someone tries logging in to an account and is prompted for a 2FA
code or sign-in token, even if the account's password or e-mail is
updated in the meantime, the session will show the prompt and allow
the login process to complete with a valid 2FA code or sign-in token
Eugen Rochko 4 ani în urmă
părinte
comite
8532429af7

+ 1 - 1
app/controllers/api/base_controller.rb

@@ -103,7 +103,7 @@ class Api::BaseController < ApplicationController
     elsif !current_user.functional?
     elsif !current_user.functional?
       render json: { error: 'Your login is currently disabled' }, status: 403
       render json: { error: 'Your login is currently disabled' }, status: 403
     else
     else
-      set_user_activity
+      update_user_sign_in
     end
     end
   end
   end
 
 

+ 21 - 1
app/controllers/auth/sessions_controller.rb

@@ -7,6 +7,7 @@ class Auth::SessionsController < Devise::SessionsController
 
 
   skip_before_action :require_no_authentication, only: [:create]
   skip_before_action :require_no_authentication, only: [:create]
   skip_before_action :require_functional!
   skip_before_action :require_functional!
+  skip_before_action :update_user_sign_in
 
 
   include TwoFactorAuthenticationConcern
   include TwoFactorAuthenticationConcern
   include SignInTokenAuthenticationConcern
   include SignInTokenAuthenticationConcern
@@ -24,6 +25,7 @@ class Auth::SessionsController < Devise::SessionsController
 
 
   def create
   def create
     super do |resource|
     super do |resource|
+      resource.update_sign_in!(request, new_sign_in: true)
       remember_me(resource)
       remember_me(resource)
       flash.delete(:notice)
       flash.delete(:notice)
     end
     end
@@ -57,7 +59,7 @@ class Auth::SessionsController < Devise::SessionsController
 
 
   def find_user
   def find_user
     if session[:attempt_user_id]
     if session[:attempt_user_id]
-      User.find(session[:attempt_user_id])
+      User.find_by(id: session[:attempt_user_id])
     else
     else
       user   = User.authenticate_with_ldap(user_params) if Devise.ldap_authentication
       user   = User.authenticate_with_ldap(user_params) if Devise.ldap_authentication
       user ||= User.authenticate_with_pam(user_params) if Devise.pam_authentication
       user ||= User.authenticate_with_pam(user_params) if Devise.pam_authentication
@@ -90,6 +92,7 @@ class Auth::SessionsController < Devise::SessionsController
 
 
   def require_no_authentication
   def require_no_authentication
     super
     super
+
     # Delete flash message that isn't entirely useful and may be confusing in
     # Delete flash message that isn't entirely useful and may be confusing in
     # most cases because /web doesn't display/clear flash messages.
     # most cases because /web doesn't display/clear flash messages.
     flash.delete(:alert) if flash[:alert] == I18n.t('devise.failure.already_authenticated')
     flash.delete(:alert) if flash[:alert] == I18n.t('devise.failure.already_authenticated')
@@ -107,13 +110,30 @@ class Auth::SessionsController < Devise::SessionsController
 
 
   def home_paths(resource)
   def home_paths(resource)
     paths = [about_path]
     paths = [about_path]
+
     if single_user_mode? && resource.is_a?(User)
     if single_user_mode? && resource.is_a?(User)
       paths << short_account_path(username: resource.account)
       paths << short_account_path(username: resource.account)
     end
     end
+
     paths
     paths
   end
   end
 
 
   def continue_after?
   def continue_after?
     truthy_param?(:continue)
     truthy_param?(:continue)
   end
   end
+
+  def restart_session
+    clear_attempt_from_session
+    redirect_to new_user_session_path, alert: I18n.t('devise.failure.timeout')
+  end
+
+  def set_attempt_session(user)
+    session[:attempt_user_id]         = user.id
+    session[:attempt_user_updated_at] = user.updated_at.to_s
+  end
+
+  def clear_attempt_from_session
+    session.delete(:attempt_user_id)
+    session.delete(:attempt_user_updated_at)
+  end
 end
 end

+ 9 - 7
app/controllers/concerns/sign_in_token_authentication_concern.rb

@@ -18,7 +18,9 @@ module SignInTokenAuthenticationConcern
   def authenticate_with_sign_in_token
   def authenticate_with_sign_in_token
     user = self.resource = find_user
     user = self.resource = find_user
 
 
-    if user_params[:sign_in_token_attempt].present? && session[:attempt_user_id]
+    if user.present? && session[:attempt_user_id].present? && session[:attempt_user_updated_at] != user.updated_at.to_s
+      restart_session
+    elsif user_params.key?(:sign_in_token_attempt) && session[:attempt_user_id]
       authenticate_with_sign_in_token_attempt(user)
       authenticate_with_sign_in_token_attempt(user)
     elsif user.present? && user.external_or_valid_password?(user_params[:password])
     elsif user.present? && user.external_or_valid_password?(user_params[:password])
       prompt_for_sign_in_token(user)
       prompt_for_sign_in_token(user)
@@ -27,7 +29,7 @@ module SignInTokenAuthenticationConcern
 
 
   def authenticate_with_sign_in_token_attempt(user)
   def authenticate_with_sign_in_token_attempt(user)
     if valid_sign_in_token_attempt?(user)
     if valid_sign_in_token_attempt?(user)
-      session.delete(:attempt_user_id)
+      clear_attempt_from_session
       remember_me(user)
       remember_me(user)
       sign_in(user)
       sign_in(user)
     else
     else
@@ -42,10 +44,10 @@ module SignInTokenAuthenticationConcern
       UserMailer.sign_in_token(user, request.remote_ip, request.user_agent, Time.now.utc.to_s).deliver_later!
       UserMailer.sign_in_token(user, request.remote_ip, request.user_agent, Time.now.utc.to_s).deliver_later!
     end
     end
 
 
-    set_locale do
-      session[:attempt_user_id] = user.id
-      @body_classes = 'lighter'
-      render :sign_in_token
-    end
+    set_attempt_session(user)
+
+    @body_classes = 'lighter'
+
+    set_locale { render :sign_in_token }
   end
   end
 end
 end

+ 18 - 14
app/controllers/concerns/two_factor_authentication_concern.rb

@@ -37,9 +37,11 @@ module TwoFactorAuthenticationConcern
   def authenticate_with_two_factor
   def authenticate_with_two_factor
     user = self.resource = find_user
     user = self.resource = find_user
 
 
-    if user.webauthn_enabled? && user_params[:credential].present? && session[:attempt_user_id]
+    if user.present? && session[:attempt_user_id].present? && session[:attempt_user_updated_at] != user.updated_at.to_s
+      restart_session
+    elsif user.webauthn_enabled? && user_params.key?(:credential) && session[:attempt_user_id]
       authenticate_with_two_factor_via_webauthn(user)
       authenticate_with_two_factor_via_webauthn(user)
-    elsif user_params[:otp_attempt].present? && session[:attempt_user_id]
+    elsif user_params.key?(:otp_attempt) && session[:attempt_user_id]
       authenticate_with_two_factor_via_otp(user)
       authenticate_with_two_factor_via_otp(user)
     elsif user.present? && user.external_or_valid_password?(user_params[:password])
     elsif user.present? && user.external_or_valid_password?(user_params[:password])
       prompt_for_two_factor(user)
       prompt_for_two_factor(user)
@@ -50,7 +52,7 @@ module TwoFactorAuthenticationConcern
     webauthn_credential = WebAuthn::Credential.from_get(user_params[:credential])
     webauthn_credential = WebAuthn::Credential.from_get(user_params[:credential])
 
 
     if valid_webauthn_credential?(user, webauthn_credential)
     if valid_webauthn_credential?(user, webauthn_credential)
-      session.delete(:attempt_user_id)
+      clear_attempt_from_session
       remember_me(user)
       remember_me(user)
       sign_in(user)
       sign_in(user)
       render json: { redirect_path: root_path }, status: :ok
       render json: { redirect_path: root_path }, status: :ok
@@ -61,7 +63,7 @@ module TwoFactorAuthenticationConcern
 
 
   def authenticate_with_two_factor_via_otp(user)
   def authenticate_with_two_factor_via_otp(user)
     if valid_otp_attempt?(user)
     if valid_otp_attempt?(user)
-      session.delete(:attempt_user_id)
+      clear_attempt_from_session
       remember_me(user)
       remember_me(user)
       sign_in(user)
       sign_in(user)
     else
     else
@@ -71,16 +73,18 @@ module TwoFactorAuthenticationConcern
   end
   end
 
 
   def prompt_for_two_factor(user)
   def prompt_for_two_factor(user)
-    set_locale do
-      session[:attempt_user_id] = user.id
-      @body_classes = 'lighter'
-      @webauthn_enabled = user.webauthn_enabled?
-      @scheme_type = if user.webauthn_enabled? && user_params[:otp_attempt].blank?
-                       'webauthn'
-                     else
-                       'totp'
-                     end
-      render :two_factor
+    set_attempt_session(user)
+
+    @body_classes     = 'lighter'
+    @webauthn_enabled = user.webauthn_enabled?
+    @scheme_type      = begin
+      if user.webauthn_enabled? && user_params[:otp_attempt].blank?
+        'webauthn'
+      else
+        'totp'
+      end
     end
     end
+
+    set_locale { render :two_factor }
   end
   end
 end
 end

+ 3 - 4
app/controllers/concerns/user_tracking_concern.rb

@@ -6,14 +6,13 @@ module UserTrackingConcern
   UPDATE_SIGN_IN_HOURS = 24
   UPDATE_SIGN_IN_HOURS = 24
 
 
   included do
   included do
-    before_action :set_user_activity
+    before_action :update_user_sign_in
   end
   end
 
 
   private
   private
 
 
-  def set_user_activity
-    return unless user_needs_sign_in_update?
-    current_user.update_tracked_fields!(request)
+  def update_user_sign_in
+    current_user.update_sign_in!(request) if user_needs_sign_in_update?
   end
   end
 
 
   def user_needs_sign_in_update?
   def user_needs_sign_in_update?

+ 19 - 6
app/models/user.rb

@@ -63,7 +63,7 @@ class User < ApplicationRecord
   devise :two_factor_backupable,
   devise :two_factor_backupable,
          otp_number_of_backup_codes: 10
          otp_number_of_backup_codes: 10
 
 
-  devise :registerable, :recoverable, :rememberable, :trackable, :validatable,
+  devise :registerable, :recoverable, :rememberable, :validatable,
          :confirmable
          :confirmable
 
 
   include Omniauthable
   include Omniauthable
@@ -165,6 +165,24 @@ class User < ApplicationRecord
     prepare_new_user! if new_user && approved?
     prepare_new_user! if new_user && approved?
   end
   end
 
 
+  def update_sign_in!(request, new_sign_in: false)
+    old_current, new_current = current_sign_in_at, Time.now.utc
+    self.last_sign_in_at     = old_current || new_current
+    self.current_sign_in_at  = new_current
+
+    old_current, new_current = current_sign_in_ip, request.remote_ip
+    self.last_sign_in_ip     = old_current || new_current
+    self.current_sign_in_ip  = new_current
+
+    if new_sign_in
+      self.sign_in_count ||= 0
+      self.sign_in_count  += 1
+    end
+
+    save(validate: false) unless new_record?
+    prepare_returning_user!
+  end
+
   def pending?
   def pending?
     !approved?
     !approved?
   end
   end
@@ -196,11 +214,6 @@ class User < ApplicationRecord
     prepare_new_user!
     prepare_new_user!
   end
   end
 
 
-  def update_tracked_fields!(request)
-    super
-    prepare_returning_user!
-  end
-
   def otp_enabled?
   def otp_enabled?
     otp_required_for_login
     otp_required_for_login
   end
   end

+ 7 - 7
spec/controllers/auth/sessions_controller_spec.rb

@@ -219,7 +219,7 @@ RSpec.describe Auth::SessionsController, type: :controller do
 
 
         context 'using a valid OTP' do
         context 'using a valid OTP' do
           before do
           before do
-            post :create, params: { user: { otp_attempt: user.current_otp } }, session: { attempt_user_id: user.id }
+            post :create, params: { user: { otp_attempt: user.current_otp } }, session: { attempt_user_id: user.id, attempt_user_updated_at: user.updated_at.to_s }
           end
           end
 
 
           it 'redirects to home' do
           it 'redirects to home' do
@@ -234,7 +234,7 @@ RSpec.describe Auth::SessionsController, type: :controller do
         context 'when the server has an decryption error' do
         context 'when the server has an decryption error' do
           before do
           before do
             allow_any_instance_of(User).to receive(:validate_and_consume_otp!).and_raise(OpenSSL::Cipher::CipherError)
             allow_any_instance_of(User).to receive(:validate_and_consume_otp!).and_raise(OpenSSL::Cipher::CipherError)
-            post :create, params: { user: { otp_attempt: user.current_otp } }, session: { attempt_user_id: user.id }
+            post :create, params: { user: { otp_attempt: user.current_otp } }, session: { attempt_user_id: user.id, attempt_user_updated_at: user.updated_at.to_s }
           end
           end
 
 
           it 'shows a login error' do
           it 'shows a login error' do
@@ -248,7 +248,7 @@ RSpec.describe Auth::SessionsController, type: :controller do
 
 
         context 'using a valid recovery code' do
         context 'using a valid recovery code' do
           before do
           before do
-            post :create, params: { user: { otp_attempt: recovery_codes.first } }, session: { attempt_user_id: user.id }
+            post :create, params: { user: { otp_attempt: recovery_codes.first } }, session: { attempt_user_id: user.id, attempt_user_updated_at: user.updated_at.to_s }
           end
           end
 
 
           it 'redirects to home' do
           it 'redirects to home' do
@@ -262,7 +262,7 @@ RSpec.describe Auth::SessionsController, type: :controller do
 
 
         context 'using an invalid OTP' do
         context 'using an invalid OTP' do
           before do
           before do
-            post :create, params: { user: { otp_attempt: 'wrongotp' } }, session: { attempt_user_id: user.id }
+            post :create, params: { user: { otp_attempt: 'wrongotp' } }, session: { attempt_user_id: user.id, attempt_user_updated_at: user.updated_at.to_s }
           end
           end
 
 
           it 'shows a login error' do
           it 'shows a login error' do
@@ -334,7 +334,7 @@ RSpec.describe Auth::SessionsController, type: :controller do
           before do
           before do
             @controller.session[:webauthn_challenge] = challenge
             @controller.session[:webauthn_challenge] = challenge
 
 
-            post :create, params: { user: { credential: fake_credential } }, session: { attempt_user_id: user.id }
+            post :create, params: { user: { credential: fake_credential } }, session: { attempt_user_id: user.id, attempt_user_updated_at: user.updated_at.to_s }
           end
           end
 
 
           it 'instructs the browser to redirect to home' do
           it 'instructs the browser to redirect to home' do
@@ -383,7 +383,7 @@ RSpec.describe Auth::SessionsController, type: :controller do
       context 'using a valid sign in token' do
       context 'using a valid sign in token' do
         before do
         before do
           user.generate_sign_in_token && user.save
           user.generate_sign_in_token && user.save
-          post :create, params: { user: { sign_in_token_attempt: user.sign_in_token } }, session: { attempt_user_id: user.id }
+          post :create, params: { user: { sign_in_token_attempt: user.sign_in_token } }, session: { attempt_user_id: user.id, attempt_user_updated_at: user.updated_at.to_s }
         end
         end
 
 
         it 'redirects to home' do
         it 'redirects to home' do
@@ -397,7 +397,7 @@ RSpec.describe Auth::SessionsController, type: :controller do
 
 
       context 'using an invalid sign in token' do
       context 'using an invalid sign in token' do
         before do
         before do
-          post :create, params: { user: { sign_in_token_attempt: 'wrongotp' } }, session: { attempt_user_id: user.id }
+          post :create, params: { user: { sign_in_token_attempt: 'wrongotp' } }, session: { attempt_user_id: user.id, attempt_user_updated_at: user.updated_at.to_s }
         end
         end
 
 
         it 'shows a login error' do
         it 'shows a login error' do