diff options
author | GitLab Bot <gitlab-bot@gitlab.com> | 2021-01-13 10:44:41 +0000 |
---|---|---|
committer | GitLab Bot <gitlab-bot@gitlab.com> | 2021-01-13 10:44:41 +0000 |
commit | e861919633e0aac16509c0415f71eda69902bff9 (patch) | |
tree | 3e65f7fbe7e738bf0dba2a66c0bf82b962daba34 /app/controllers | |
parent | 1ef3b81f122ba52e955bee694c38d6fb4dae3068 (diff) | |
download | gitlab-ce-e861919633e0aac16509c0415f71eda69902bff9.tar.gz |
Add latest changes from gitlab-org/security/gitlab@13-7-stable-ee
Diffstat (limited to 'app/controllers')
-rw-r--r-- | app/controllers/oauth/authorizations_controller.rb | 23 |
1 files changed, 12 insertions, 11 deletions
diff --git a/app/controllers/oauth/authorizations_controller.rb b/app/controllers/oauth/authorizations_controller.rb index ade698baa7f..857f36e3833 100644 --- a/app/controllers/oauth/authorizations_controller.rb +++ b/app/controllers/oauth/authorizations_controller.rb @@ -4,7 +4,7 @@ class Oauth::AuthorizationsController < Doorkeeper::AuthorizationsController include Gitlab::Experimentation::ControllerConcern include InitializesCurrentUserMode - before_action :verify_confirmed_email! + before_action :verify_confirmed_email!, :verify_confidential_application! layout 'profile' @@ -24,18 +24,19 @@ class Oauth::AuthorizationsController < Doorkeeper::AuthorizationsController end end - def create - # Confidential apps require the client_secret to be sent with the request. - # Doorkeeper allows implicit grant flow requests (response_type=token) to - # work without client_secret regardless of the confidential setting. - if pre_auth.authorizable? && pre_auth.response_type == 'token' && pre_auth.client.application.confidential - render "doorkeeper/authorizations/error" - else - super - end + private + + # Confidential apps require the client_secret to be sent with the request. + # Doorkeeper allows implicit grant flow requests (response_type=token) to + # work without client_secret regardless of the confidential setting. + # This leads to security vulnerabilities and we want to block it. + def verify_confidential_application! + render 'doorkeeper/authorizations/error' if authorizable_confidential? end - private + def authorizable_confidential? + pre_auth.authorizable? && pre_auth.response_type == 'token' && pre_auth.client.application.confidential + end def verify_confirmed_email! return if current_user&.confirmed? |