summaryrefslogtreecommitdiff
path: root/app
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2021-01-13 10:44:41 +0000
committerGitLab Bot <gitlab-bot@gitlab.com>2021-01-13 10:44:41 +0000
commite861919633e0aac16509c0415f71eda69902bff9 (patch)
tree3e65f7fbe7e738bf0dba2a66c0bf82b962daba34 /app
parent1ef3b81f122ba52e955bee694c38d6fb4dae3068 (diff)
downloadgitlab-ce-e861919633e0aac16509c0415f71eda69902bff9.tar.gz
Add latest changes from gitlab-org/security/gitlab@13-7-stable-ee
Diffstat (limited to 'app')
-rw-r--r--app/controllers/oauth/authorizations_controller.rb23
1 files changed, 12 insertions, 11 deletions
diff --git a/app/controllers/oauth/authorizations_controller.rb b/app/controllers/oauth/authorizations_controller.rb
index ade698baa7f..857f36e3833 100644
--- a/app/controllers/oauth/authorizations_controller.rb
+++ b/app/controllers/oauth/authorizations_controller.rb
@@ -4,7 +4,7 @@ class Oauth::AuthorizationsController < Doorkeeper::AuthorizationsController
include Gitlab::Experimentation::ControllerConcern
include InitializesCurrentUserMode
- before_action :verify_confirmed_email!
+ before_action :verify_confirmed_email!, :verify_confidential_application!
layout 'profile'
@@ -24,18 +24,19 @@ class Oauth::AuthorizationsController < Doorkeeper::AuthorizationsController
end
end
- def create
- # Confidential apps require the client_secret to be sent with the request.
- # Doorkeeper allows implicit grant flow requests (response_type=token) to
- # work without client_secret regardless of the confidential setting.
- if pre_auth.authorizable? && pre_auth.response_type == 'token' && pre_auth.client.application.confidential
- render "doorkeeper/authorizations/error"
- else
- super
- end
+ private
+
+ # Confidential apps require the client_secret to be sent with the request.
+ # Doorkeeper allows implicit grant flow requests (response_type=token) to
+ # work without client_secret regardless of the confidential setting.
+ # This leads to security vulnerabilities and we want to block it.
+ def verify_confidential_application!
+ render 'doorkeeper/authorizations/error' if authorizable_confidential?
end
- private
+ def authorizable_confidential?
+ pre_auth.authorizable? && pre_auth.response_type == 'token' && pre_auth.client.application.confidential
+ end
def verify_confirmed_email!
return if current_user&.confirmed?