-
Notifications
You must be signed in to change notification settings - Fork 1.7k
CodeQL query to detect open Spring Boot actuator endpoints #2901
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
aschackmull
merged 7 commits into
github:master
from
ggolawski:java-spring-boot-actuators
Apr 29, 2020
Merged
Changes from 4 commits
Commits
Show all changes
7 commits
Select commit
Hold shift + click to select a range
fda4ab1
CodeQL query to detect open Spring Boot actuator endpoints
ggolawski cffe89f
Merge branch 'master' into java-spring-boot-actuators
ggolawski f05b2af
Move to experimental
ggolawski 6ca963a
Fix
ggolawski 79d7ea3
Update java/ql/src/experimental/Security/CWE/CWE-016/SpringBootActuat…
ggolawski 1d8da90
Make the test runnable via codeql test run
ggolawski 639aa82
Remove qlpack.yml as these are not needed
ggolawski File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
22 changes: 22 additions & 0 deletions
22
java/ql/src/experimental/Security/CWE/CWE-016/SpringBootActuators.java
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
@Configuration(proxyBeanMethods = false) | ||
public class SpringBootActuators extends WebSecurityConfigurerAdapter { | ||
|
||
@Override | ||
protected void configure(HttpSecurity http) throws Exception { | ||
// BAD: Unauthenticated access to Spring Boot actuator endpoints is allowed | ||
http.requestMatcher(EndpointRequest.toAnyEndpoint()).authorizeRequests((requests) -> | ||
requests.anyRequest().permitAll()); | ||
} | ||
} | ||
|
||
@Configuration(proxyBeanMethods = false) | ||
public class ActuatorSecurity extends WebSecurityConfigurerAdapter { | ||
|
||
@Override | ||
protected void configure(HttpSecurity http) throws Exception { | ||
// GOOD: only users with ENDPOINT_ADMIN role are allowed to access the actuator endpoints | ||
http.requestMatcher(EndpointRequest.toAnyEndpoint()).authorizeRequests((requests) -> | ||
requests.anyRequest().hasRole("ENDPOINT_ADMIN")); | ||
http.httpBasic(); | ||
} | ||
} |
39 changes: 39 additions & 0 deletions
39
java/ql/src/experimental/Security/CWE/CWE-016/SpringBootActuators.qhelp
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,39 @@ | ||
<!DOCTYPE qhelp PUBLIC | ||
"-//Semmle//qhelp//EN" | ||
"qhelp.dtd"> | ||
<qhelp> | ||
<overview> | ||
<p>Spring Boot includes a number of additional features called actuators that let you monitor | ||
and interact with your web application. Exposing unprotected actuator endpoints via JXM or HTTP | ||
can, however, lead to information disclosure or even to remote code execution vulnerability.</p> | ||
</overview> | ||
|
||
<recommendation> | ||
<p>Since actuator endpoints may contain sensitive information, careful consideration should be | ||
given about when to expose them. You should take care to secure exposed HTTP endpoints in the same | ||
way that you would any other sensitive URL. If Spring Security is present, endpoints are secured by | ||
default using Spring Security’s content-negotiation strategy. If you wish to configure custom | ||
security for HTTP endpoints, for example, only allow users with a certain role to access them, | ||
Spring Boot provides some convenient <code>RequestMatcher</code> objects that can be used in | ||
combination with Spring Security.</p> | ||
</recommendation> | ||
|
||
<example> | ||
<p>In the first example, the custom security configuration allows unauthenticated access to all | ||
actuator endpoints. This may lead to sensitive information disclosure and should be avoided.</p> | ||
<p>In the second example, only users with <code>ENDPOINT_ADMIN</code> role are allowed to access | ||
the actuator endpoints.</p> | ||
|
||
<sample src="SpringBootActuators.java" /> | ||
</example> | ||
|
||
<references> | ||
<li> | ||
Spring Boot documentation: | ||
<a href="https://docs.spring.io/spring-boot/docs/current/reference/html/production-ready-features.html">Actuators</a>. | ||
</li> | ||
<li> | ||
<a href="https://www.veracode.com/blog/research/exploiting-spring-boot-actuators">Exploiting Spring Boot Actuators</a> | ||
</li> | ||
</references> | ||
</qhelp> |
18 changes: 18 additions & 0 deletions
18
java/ql/src/experimental/Security/CWE/CWE-016/SpringBootActuators.ql
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
/** | ||
* @name Exposed Spring Boot actuators | ||
* @description Exposing Spring Boot actuators may lead to internal application's information leak | ||
* or even to remote code execution. | ||
* @kind problem | ||
* @problem.severity error | ||
* @precision high | ||
* @id java/spring-boot-exposed-actuators | ||
* @tags security | ||
* external/cwe/cwe-16 | ||
*/ | ||
|
||
import java | ||
import SpringBootActuators | ||
|
||
from PermitAllCall permitAllCall | ||
where permitAllCall.permitsSpringBootActuators() | ||
select permitAllCall, "Unauthenticated access to Spring Boot actuator is allowed." |
143 changes: 143 additions & 0 deletions
143
java/ql/src/experimental/Security/CWE/CWE-016/SpringBootActuators.qll
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,143 @@ | ||
import java | ||
|
||
/** The class `org.springframework.security.config.annotation.web.builders.HttpSecurity`. */ | ||
class TypeHttpSecurity extends Class { | ||
TypeHttpSecurity() { | ||
this | ||
.hasQualifiedName("org.springframework.security.config.annotation.web.builders", | ||
"HttpSecurity") | ||
} | ||
} | ||
|
||
/** | ||
* The class | ||
* `org.springframework.security.config.annotation.web.configurers.ExpressionUrlAuthorizationConfigurer`. | ||
*/ | ||
class TypeAuthorizedUrl extends Class { | ||
TypeAuthorizedUrl() { | ||
this | ||
.hasQualifiedName("org.springframework.security.config.annotation.web.configurers", | ||
"ExpressionUrlAuthorizationConfigurer<HttpSecurity>$AuthorizedUrl<>") | ||
} | ||
} | ||
|
||
/** | ||
* The class | ||
* `org.springframework.security.config.annotation.web.AbstractRequestMatcherRegistry`. | ||
*/ | ||
class TypeAbstractRequestMatcherRegistry extends Class { | ||
TypeAbstractRequestMatcherRegistry() { | ||
this | ||
.hasQualifiedName("org.springframework.security.config.annotation.web", | ||
"AbstractRequestMatcherRegistry<AuthorizedUrl<>>") | ||
} | ||
} | ||
|
||
/** | ||
* The class | ||
* `org.springframework.boot.actuate.autoconfigure.security.servlet.EndpointRequest.EndpointRequestMatcher`. | ||
*/ | ||
class TypeEndpointRequestMatcher extends Class { | ||
TypeEndpointRequestMatcher() { | ||
this | ||
.hasQualifiedName("org.springframework.boot.actuate.autoconfigure.security.servlet", | ||
"EndpointRequest$EndpointRequestMatcher") | ||
} | ||
} | ||
|
||
/** | ||
* A call to `HttpSecurity.requestMatcher` method with argument of type | ||
* `EndpointRequestMatcher`. | ||
*/ | ||
class RequestMatcherCall extends MethodAccess { | ||
RequestMatcherCall() { | ||
getMethod().hasName("requestMatcher") and | ||
getMethod().getDeclaringType() instanceof TypeHttpSecurity and | ||
getArgument(0).getType() instanceof TypeEndpointRequestMatcher | ||
} | ||
} | ||
|
||
/** | ||
* A call to `HttpSecurity.requestMatchers` method with lambda argument resolving to | ||
* `EndpointRequestMatcher` type. | ||
*/ | ||
class RequestMatchersCall extends MethodAccess { | ||
RequestMatchersCall() { | ||
getMethod().hasName("requestMatchers") and | ||
getMethod().getDeclaringType() instanceof TypeHttpSecurity and | ||
getArgument(0).(LambdaExpr).getExprBody().getType() instanceof TypeEndpointRequestMatcher | ||
} | ||
} | ||
|
||
/** A call to `HttpSecurity.authorizeRequests` method. */ | ||
class AuthorizeRequestsCall extends MethodAccess { | ||
AuthorizeRequestsCall() { | ||
getMethod().hasName("authorizeRequests") and | ||
getMethod().getDeclaringType() instanceof TypeHttpSecurity | ||
} | ||
} | ||
|
||
/** A call to `AuthorizedUrl.permitAll` method. */ | ||
class PermitAllCall extends MethodAccess { | ||
PermitAllCall() { | ||
getMethod().hasName("permitAll") and | ||
getMethod().getDeclaringType() instanceof TypeAuthorizedUrl | ||
} | ||
|
||
/** Holds if `permitAll` is called on request(s) mapped to actuator endpoint(s). */ | ||
predicate permitsSpringBootActuators() { | ||
exists( | ||
RequestMatcherCall requestMatcherCall, RequestMatchersCall requestMatchersCall, | ||
RegistryRequestMatchersCall registryRequestMatchersCall, | ||
AuthorizeRequestsCall authorizeRequestsCall, AnyRequestCall anyRequestCall | ||
| | ||
// .requestMatcher(EndpointRequest).authorizeRequests([...]).[...] | ||
authorizeRequestsCall.getQualifier() = requestMatcherCall | ||
or | ||
// .requestMatchers(matcher -> EndpointRequest).authorizeRequests([...]).[...] | ||
authorizeRequestsCall.getQualifier() = requestMatchersCall | ||
or | ||
// http.authorizeRequests([...]).[...] | ||
authorizeRequestsCall.getQualifier() instanceof VarAccess | ||
| | ||
// [...].authorizeRequests(r -> r.anyRequest().permitAll()) or | ||
// [...].authorizeRequests(r -> r.requestMatchers(EndpointRequest).permitAll()) | ||
authorizeRequestsCall.getArgument(0).(LambdaExpr).getExprBody() = this and | ||
( | ||
this.getQualifier() = anyRequestCall or | ||
this.getQualifier() = registryRequestMatchersCall | ||
) | ||
or | ||
// [...].authorizeRequests().requestMatchers(EndpointRequest).permitAll() or | ||
// [...].authorizeRequests().anyRequest().permitAll() | ||
authorizeRequestsCall.getNumArgument() = 0 and | ||
( | ||
registryRequestMatchersCall.getQualifier() = authorizeRequestsCall and | ||
this.getQualifier() = registryRequestMatchersCall | ||
) | ||
or | ||
anyRequestCall.getQualifier() = authorizeRequestsCall and | ||
this.getQualifier() = anyRequestCall | ||
) | ||
} | ||
} | ||
|
||
/** A call to `AbstractRequestMatcherRegistry.anyRequest` method. */ | ||
class AnyRequestCall extends MethodAccess { | ||
AnyRequestCall() { | ||
getMethod().hasName("anyRequest") and | ||
getMethod().getDeclaringType() instanceof TypeAbstractRequestMatcherRegistry | ||
} | ||
} | ||
|
||
/** | ||
* A call to `AbstractRequestMatcherRegistry.requestMatchers` method with an argument of type | ||
* `EndpointRequestMatcher`. | ||
*/ | ||
class RegistryRequestMatchersCall extends MethodAccess { | ||
RegistryRequestMatchersCall() { | ||
getMethod().hasName("requestMatchers") and | ||
getMethod().getDeclaringType() instanceof TypeAbstractRequestMatcherRegistry and | ||
getAnArgument().getType() instanceof TypeEndpointRequestMatcher | ||
} | ||
} |
40 changes: 40 additions & 0 deletions
40
java/ql/test/experimental/query-tests/security/CWE-016/SpringBootActuators.java
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,40 @@ | ||
import org.springframework.boot.actuate.autoconfigure.security.servlet.EndpointRequest; | ||
import org.springframework.security.config.annotation.web.builders.HttpSecurity; | ||
|
||
public class SpringBootActuators { | ||
protected void configure(HttpSecurity http) throws Exception { | ||
http.requestMatcher(EndpointRequest.toAnyEndpoint()).authorizeRequests(requests -> requests.anyRequest().permitAll()); | ||
} | ||
|
||
protected void configure2(HttpSecurity http) throws Exception { | ||
http.requestMatcher(EndpointRequest.toAnyEndpoint()).authorizeRequests().requestMatchers(EndpointRequest.toAnyEndpoint()).permitAll(); | ||
} | ||
|
||
protected void configure3(HttpSecurity http) throws Exception { | ||
http.requestMatchers(matcher -> EndpointRequest.toAnyEndpoint()).authorizeRequests().requestMatchers(EndpointRequest.toAnyEndpoint()).permitAll(); | ||
} | ||
|
||
protected void configure4(HttpSecurity http) throws Exception { | ||
http.requestMatcher(EndpointRequest.toAnyEndpoint()).authorizeRequests().anyRequest().permitAll(); | ||
} | ||
|
||
protected void configure5(HttpSecurity http) throws Exception { | ||
http.authorizeRequests().requestMatchers(EndpointRequest.toAnyEndpoint()).permitAll(); | ||
} | ||
|
||
protected void configure6(HttpSecurity http) throws Exception { | ||
http.authorizeRequests(requests -> requests.requestMatchers(EndpointRequest.toAnyEndpoint()).permitAll()); | ||
} | ||
|
||
protected void configure7(HttpSecurity http) throws Exception { | ||
http.requestMatchers(matcher -> EndpointRequest.toAnyEndpoint()).authorizeRequests().anyRequest().permitAll(); | ||
} | ||
|
||
protected void configureOk1(HttpSecurity http) throws Exception { | ||
http.requestMatcher(EndpointRequest.toAnyEndpoint()); | ||
} | ||
|
||
protected void configureOk2(HttpSecurity http) throws Exception { | ||
http.requestMatchers().requestMatchers(EndpointRequest.toAnyEndpoint()); | ||
} | ||
} |
1 change: 1 addition & 0 deletions
1
java/ql/test/experimental/query-tests/security/CWE-016/SpringBootActuators.qlref
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
Security/CWE/CWE-016/SpringBootActuators.ql |
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.