Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix default-src override for script eval #49

Merged
merged 2 commits into from
Dec 17, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ jobs:
runs-on: ${{ matrix.os }}
strategy:
matrix:
rust: ["1.70.0", "stable", "beta"]
rust: ["1.71.1", "stable", "beta"]
os: [ubuntu-latest]
cargo_params: ["--features=version-sync", "--features=serde"]
steps:
Expand Down
5 changes: 5 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,10 @@
# Unreleased

# 0.5.3

* Minimum supported Rust version: 1.71.1
* Fix default-src behavior with eval

# 0.5.2

* Minimum supported Rust version: 1.70
Expand Down
2 changes: 1 addition & 1 deletion Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ readme = "README.md"
documentation = "https://docs.rs/content-security-policy/"
repository = "https://github.com/rust-ammonia/rust-content-security-policy"
edition = "2018"
rust-version = "1.70"
rust-version = "1.71.1"
exclude = [
"Cargo.nix",
"default.nix",
Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# Parse and validate Web [Content-Security-Policy level 3](https://www.w3.org/TR/CSP/)

[![Crates.IO](https://img.shields.io/crates/v/content-security-policy.svg)](https://crates.rs/crates/content-security-policy)
![Requires rustc 1.70.0](https://img.shields.io/badge/rustc-1.70.0+-green.svg)
![Requires rustc 1.71.1](https://img.shields.io/badge/rustc-1.71.1+-green.svg)

This function parses a CSP string into a data structure, and provides a bunch of functions you can call on it (basically all of the "hooks" defined in the CSP standard). It directly uses the `url` crate, but it's intentionally agnostic to your HTML parser and your networking stack, so there are a few things it doesn't do:

Expand Down
60 changes: 24 additions & 36 deletions src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -345,29 +345,39 @@ impl CspList {
}
/// https://www.w3.org/TR/CSP/#can-compile-strings
pub fn is_js_evaluation_allowed(&self) -> CheckResult {
let mut allowed = CheckResult::Allowed;
let mut result = CheckResult::Allowed;
for policy in &self.0 {
for directive in &policy.directive_set {
if matches!(allowed, CheckResult::Allowed) {
allowed = directive.is_js_evaluation_allowed(&policy);
if matches!(allowed, CheckResult::Blocked) { return CheckResult::Blocked };
}
let source_list = policy.directive_set
.iter()
.find(|directive| directive.name == "script-src")
.or_else(|| policy.directive_set.iter().find(|directive| directive.name == "default-src"))
.map(|directive| SourceList(&directive.value));
if let Some(source_list) = source_list {
result = match source_list.does_a_source_list_allow_js_evaluation(&policy.disposition) {
AllowResult::Allows => CheckResult::Allowed,
AllowResult::DoesNotAllow => CheckResult::Blocked,
};
}
}
CheckResult::Allowed
result
}
/// https://www.w3.org/TR/CSP/#can-compile-wasm-bytes
pub fn is_wasm_evaluation_allowed(&self) -> CheckResult {
let mut allowed = CheckResult::Allowed;
let mut result = CheckResult::Allowed;
for policy in &self.0 {
for directive in &policy.directive_set {
if matches!(allowed, CheckResult::Allowed) {
allowed = directive.is_wasm_evaluation_allowed(&policy);
if matches!(allowed, CheckResult::Blocked) { return CheckResult::Blocked };
}
let source_list = policy.directive_set
.iter()
.find(|directive| directive.name == "script-src")
.or_else(|| policy.directive_set.iter().find(|directive| directive.name == "default-src"))
.map(|directive| SourceList(&directive.value));
if let Some(source_list) = source_list {
result = match source_list.does_a_source_list_allow_wasm_evaluation(&policy.disposition) {
AllowResult::Allows => CheckResult::Allowed,
AllowResult::DoesNotAllow => CheckResult::Blocked,
};
}
}
CheckResult::Allowed
result
}
}

Expand Down Expand Up @@ -1056,28 +1066,6 @@ impl Directive {
_ => None,
}
}
/// https://www.w3.org/TR/CSP/#can-compile-strings
pub fn is_js_evaluation_allowed(&self, policy: &Policy) -> CheckResult {
let source_list = SourceList(&self.value);
match &self.name[..] {
"script-src" | "default-src" => match source_list.does_a_source_list_allow_js_evaluation(&policy.disposition) {
AllowResult::Allows => CheckResult::Allowed,
AllowResult::DoesNotAllow => CheckResult::Blocked,
},
_ => CheckResult::Allowed
}
}
/// https://www.w3.org/TR/CSP/#can-compile-wasm-bytes
pub fn is_wasm_evaluation_allowed(&self, policy: &Policy) -> CheckResult {
let source_list = SourceList(&self.value);
match &self.name[..] {
"script-src" | "default-src" => match source_list.does_a_source_list_allow_wasm_evaluation(&policy.disposition) {
AllowResult::Allows => CheckResult::Allowed,
AllowResult::DoesNotAllow => CheckResult::Blocked
},
_ => CheckResult::Allowed
}
}
}

/// https://www.w3.org/TR/CSP/#effective-directive-for-inline-check
Expand Down
15 changes: 15 additions & 0 deletions tests/examples.rs
Original file line number Diff line number Diff line change
Expand Up @@ -472,6 +472,21 @@ test_should_js_wasm_evaluation_be_blocked!{
kind: is_wasm_evaluation_allowed,
result: Allowed
),

// https://github.com/rust-ammonia/rust-content-security-policy/issues/48
( name: eval_webassembly_default_src_override,
policy: "default-src self; script-src self 'unsafe-eval'",
disposition: Enforce,
kind: is_wasm_evaluation_allowed,
result: Allowed
),
( name: eval_javascript_default_src_override,
policy: "default-src self; script-src self 'unsafe-eval'",
disposition: Enforce,
kind: is_js_evaluation_allowed,
result: Allowed
),

(
name: eval_javascript_works_if_multiple_policies_were_passed,
policy: "script-src 'self' 'unsafe-inline' 'unsafe-eval'; connect-src 'self';",
Expand Down
Loading