summaryrefslogtreecommitdiffstats
path: root/Bugzilla/Auth/Login/CGI.pm
blob: 2406982778ec5dc8d586e317ba7d4f8348b1ffdb (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
# -*- Mode: perl; indent-tabs-mode: nil -*-
#
# The contents of this file are subject to the Mozilla Public
# License Version 1.1 (the "License"); you may not use this file
# except in compliance with the License. You may obtain a copy of
# the License at http://www.mozilla.org/MPL/
#
# Software distributed under the License is distributed on an "AS
# IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
# implied. See the License for the specific language governing
# rights and limitations under the License.
#
# The Original Code is the Bugzilla Bug Tracking System.
#
# The Initial Developer of the Original Code is Netscape Communications
# Corporation. Portions created by Netscape are
# Copyright (C) 1998 Netscape Communications Corporation. All
# Rights Reserved.
#
# Contributor(s): Terry Weissman <terry@mozilla.org>
#                 Dan Mosedale <dmose@mozilla.org>
#                 Joe Robins <jmrobins@tgix.com>
#                 Dave Miller <justdave@syndicomm.com>
#                 Christopher Aillon <christopher@aillon.com>
#                 Gervase Markham <gerv@gerv.net>
#                 Christian Reis <kiko@async.com.br>
#                 Bradley Baetz <bbaetz@acm.org>
#                 Erik Stambaugh <erik@dasbistro.com>
#                 Max Kanat-Alexander <mkanat@bugzilla.org>

package Bugzilla::Auth::Login::CGI;
use strict;
use base qw(Bugzilla::Auth::Login);
use constant user_can_create_account => 1;

use Bugzilla::Constants;
use Bugzilla::WebService::Constants;
use Bugzilla::Util;
use Bugzilla::Error;
use Bugzilla::Token;

sub get_login_info {
    my ($self) = @_;
    my $params = Bugzilla->input_params;
    my $cgi    = Bugzilla->cgi;

    my $login = trim(delete $params->{'Bugzilla_login'});
    my $password = delete $params->{'Bugzilla_password'};
    # The token must match the cookie to authenticate the request.
    my $login_token = delete $params->{'Bugzilla_login_token'};
    my $login_cookie = $cgi->cookie('Bugzilla_login_request_cookie');

    my $valid = 0;
    # If the web browser accepts cookies, use them.
    if ($login_token && $login_cookie) {
        my ($time, undef) = split(/-/, $login_token);
        # Regenerate the token based on the information we have.
        my $expected_token = issue_hash_token(['login_request', $login_cookie], $time);
        $valid = 1 if $expected_token eq $login_token;
        $cgi->remove_cookie('Bugzilla_login_request_cookie');
    }
    # WebServices and other local scripts can bypass this check.
    # This is safe because we won't store a login cookie in this case.
    elsif (Bugzilla->usage_mode != USAGE_MODE_BROWSER) {
        $valid = 1;
    }
    # Else falls back to the Referer header and accept local URLs.
    # Attachments are served from a separate host (ideally), and so
    # an evil attachment cannot abuse this check with a redirect.
    elsif (my $referer = $cgi->referer) {
        my $urlbase = correct_urlbase();
        $valid = 1 if $referer =~ /^\Q$urlbase\E/;
    }
    # If the web browser doesn't accept cookies and the Referer header
    # is missing, we have no way to make sure that the authentication
    # request comes from the user.
    elsif ($login && $password) {
        ThrowUserError('auth_untrusted_request', { login => $login });
    }

    if (!defined($login) || !defined($password) || !$valid) {
         return { failure => AUTH_NODATA };
    }

    return { username => $login, password => $password };
}

sub fail_nodata {
    my ($self) = @_;
    my $cgi = Bugzilla->cgi;
    my $template = Bugzilla->template;

    if (Bugzilla->usage_mode != USAGE_MODE_BROWSER) {
        ThrowUserError('login_required');
    }

    print $cgi->header();
    $template->process("account/auth/login.html.tmpl",
                       { 'target' => $cgi->url(-relative=>1) }) 
        || ThrowTemplateError($template->error());
    exit;
}

1;