Compare commits
4 Commits
security/f
...
security/f
| Author | SHA1 | Date | |
|---|---|---|---|
| cfaf6c827e | |||
| cf1afb07f2 | |||
| ed32487cbe | |||
| 37c5e672b5 |
@@ -170,6 +170,9 @@ def _resolve_cdp_override(cdp_url: str) -> str:
|
|||||||
For discovery-style endpoints we fetch /json/version and return the
|
For discovery-style endpoints we fetch /json/version and return the
|
||||||
webSocketDebuggerUrl so downstream tools always receive a concrete browser
|
webSocketDebuggerUrl so downstream tools always receive a concrete browser
|
||||||
websocket instead of an ambiguous host:port URL.
|
websocket instead of an ambiguous host:port URL.
|
||||||
|
|
||||||
|
SECURITY FIX (V-010): Validates URLs before fetching to prevent SSRF.
|
||||||
|
Only allows localhost/private network addresses for CDP connections.
|
||||||
"""
|
"""
|
||||||
raw = (cdp_url or "").strip()
|
raw = (cdp_url or "").strip()
|
||||||
if not raw:
|
if not raw:
|
||||||
@@ -191,6 +194,35 @@ def _resolve_cdp_override(cdp_url: str) -> str:
|
|||||||
else:
|
else:
|
||||||
version_url = discovery_url.rstrip("/") + "/json/version"
|
version_url = discovery_url.rstrip("/") + "/json/version"
|
||||||
|
|
||||||
|
# SECURITY FIX (V-010): Validate URL before fetching
|
||||||
|
# Only allow localhost and private networks for CDP
|
||||||
|
from urllib.parse import urlparse
|
||||||
|
parsed = urlparse(version_url)
|
||||||
|
hostname = parsed.hostname or ""
|
||||||
|
|
||||||
|
# Allow only safe hostnames for CDP
|
||||||
|
allowed_hostnames = ["localhost", "127.0.0.1", "0.0.0.0", "::1"]
|
||||||
|
if hostname not in allowed_hostnames:
|
||||||
|
# Check if it's a private IP
|
||||||
|
try:
|
||||||
|
import ipaddress
|
||||||
|
ip = ipaddress.ip_address(hostname)
|
||||||
|
if not (ip.is_private or ip.is_loopback):
|
||||||
|
logger.error(
|
||||||
|
"SECURITY: Rejecting CDP URL '%s' - only localhost and private "
|
||||||
|
"networks are allowed to prevent SSRF attacks.",
|
||||||
|
raw
|
||||||
|
)
|
||||||
|
return raw # Return original without fetching
|
||||||
|
except ValueError:
|
||||||
|
# Not an IP - reject unknown hostnames
|
||||||
|
logger.error(
|
||||||
|
"SECURITY: Rejecting CDP URL '%s' - unknown hostname '%s'. "
|
||||||
|
"Only localhost and private IPs are allowed.",
|
||||||
|
raw, hostname
|
||||||
|
)
|
||||||
|
return raw
|
||||||
|
|
||||||
try:
|
try:
|
||||||
response = requests.get(version_url, timeout=10)
|
response = requests.get(version_url, timeout=10)
|
||||||
response.raise_for_status()
|
response.raise_for_status()
|
||||||
|
|||||||
@@ -253,6 +253,26 @@ class DockerEnvironment(BaseEnvironment):
|
|||||||
# mode uses tmpfs (ephemeral, fast, gone on cleanup).
|
# mode uses tmpfs (ephemeral, fast, gone on cleanup).
|
||||||
from tools.environments.base import get_sandbox_dir
|
from tools.environments.base import get_sandbox_dir
|
||||||
|
|
||||||
|
# SECURITY FIX (V-012): Block dangerous volume mounts
|
||||||
|
# Prevent privilege escalation via Docker socket or sensitive paths
|
||||||
|
_BLOCKED_VOLUME_PATTERNS = [
|
||||||
|
"/var/run/docker.sock",
|
||||||
|
"/run/docker.sock",
|
||||||
|
"/var/run/docker.pid",
|
||||||
|
"/proc", "/sys", "/dev",
|
||||||
|
":/", # Root filesystem mount
|
||||||
|
]
|
||||||
|
|
||||||
|
def _is_dangerous_volume(vol_spec: str) -> bool:
|
||||||
|
"""Check if volume spec is dangerous (docker socket, root fs, etc)."""
|
||||||
|
for pattern in _BLOCKED_VOLUME_PATTERNS:
|
||||||
|
if pattern in vol_spec:
|
||||||
|
return True
|
||||||
|
# Check for docker socket variations
|
||||||
|
if "docker.sock" in vol_spec.lower():
|
||||||
|
return True
|
||||||
|
return False
|
||||||
|
|
||||||
# User-configured volume mounts (from config.yaml docker_volumes)
|
# User-configured volume mounts (from config.yaml docker_volumes)
|
||||||
volume_args = []
|
volume_args = []
|
||||||
workspace_explicitly_mounted = False
|
workspace_explicitly_mounted = False
|
||||||
@@ -263,6 +283,15 @@ class DockerEnvironment(BaseEnvironment):
|
|||||||
vol = vol.strip()
|
vol = vol.strip()
|
||||||
if not vol:
|
if not vol:
|
||||||
continue
|
continue
|
||||||
|
|
||||||
|
# SECURITY FIX (V-012): Block dangerous volumes
|
||||||
|
if _is_dangerous_volume(vol):
|
||||||
|
logger.error(
|
||||||
|
f"SECURITY: Refusing to mount dangerous volume '{vol}'. "
|
||||||
|
f"Docker socket and system paths are blocked to prevent container escape."
|
||||||
|
)
|
||||||
|
continue # Skip this dangerous volume
|
||||||
|
|
||||||
if ":" in vol:
|
if ":" in vol:
|
||||||
volume_args.extend(["-v", vol])
|
volume_args.extend(["-v", vol])
|
||||||
if ":/workspace" in vol:
|
if ":/workspace" in vol:
|
||||||
|
|||||||
Reference in New Issue
Block a user