safe_yaml 0.1 → 1.0.5

Sign up to get free protection for your applications and to get access to all the features.
Files changed (58) hide show
  1. checksums.yaml +7 -0
  2. data/.gitignore +3 -0
  3. data/.travis.yml +48 -0
  4. data/CHANGES.md +154 -0
  5. data/Gemfile +3 -1
  6. data/LICENSE.txt +22 -0
  7. data/README.md +191 -0
  8. data/Rakefile +22 -2
  9. data/bin/safe_yaml +75 -0
  10. data/bundle_install_all_ruby_versions.sh +11 -0
  11. data/lib/safe_yaml.rb +90 -6
  12. data/lib/safe_yaml/deep.rb +34 -0
  13. data/lib/safe_yaml/libyaml_checker.rb +36 -0
  14. data/lib/safe_yaml/load.rb +181 -0
  15. data/lib/safe_yaml/parse/date.rb +37 -0
  16. data/lib/safe_yaml/parse/hexadecimal.rb +12 -0
  17. data/lib/safe_yaml/parse/sexagesimal.rb +26 -0
  18. data/lib/safe_yaml/psych_handler.rb +99 -0
  19. data/lib/safe_yaml/psych_resolver.rb +52 -0
  20. data/lib/safe_yaml/resolver.rb +94 -0
  21. data/lib/safe_yaml/safe_to_ruby_visitor.rb +29 -0
  22. data/lib/safe_yaml/store.rb +39 -0
  23. data/lib/safe_yaml/syck_hack.rb +36 -0
  24. data/lib/safe_yaml/syck_node_monkeypatch.rb +43 -0
  25. data/lib/safe_yaml/syck_resolver.rb +38 -0
  26. data/lib/safe_yaml/transform.rb +41 -0
  27. data/lib/safe_yaml/transform/to_boolean.rb +21 -0
  28. data/lib/safe_yaml/transform/to_date.rb +13 -0
  29. data/lib/safe_yaml/transform/to_float.rb +33 -0
  30. data/lib/safe_yaml/transform/to_integer.rb +26 -0
  31. data/lib/safe_yaml/transform/to_nil.rb +18 -0
  32. data/lib/safe_yaml/transform/to_symbol.rb +17 -0
  33. data/lib/safe_yaml/transform/transformation_map.rb +47 -0
  34. data/lib/{version.rb → safe_yaml/version.rb} +1 -1
  35. data/run_specs_all_ruby_versions.sh +38 -0
  36. data/safe_yaml.gemspec +11 -8
  37. data/spec/exploit.1.9.2.yaml +2 -0
  38. data/spec/exploit.1.9.3.yaml +2 -0
  39. data/spec/issue48.txt +20 -0
  40. data/spec/issue49.yml +0 -0
  41. data/spec/libyaml_checker_spec.rb +69 -0
  42. data/spec/psych_resolver_spec.rb +10 -0
  43. data/spec/resolver_specs.rb +278 -0
  44. data/spec/safe_yaml_spec.rb +697 -23
  45. data/spec/spec_helper.rb +37 -2
  46. data/spec/store_spec.rb +57 -0
  47. data/spec/support/exploitable_back_door.rb +13 -7
  48. data/spec/syck_resolver_spec.rb +10 -0
  49. data/spec/transform/base64_spec.rb +11 -0
  50. data/spec/transform/to_date_spec.rb +60 -0
  51. data/spec/transform/to_float_spec.rb +42 -0
  52. data/spec/transform/to_integer_spec.rb +64 -0
  53. data/spec/transform/to_symbol_spec.rb +51 -0
  54. data/spec/yaml_spec.rb +15 -0
  55. metadata +78 -24
  56. data/Gemfile.lock +0 -28
  57. data/lib/handler.rb +0 -86
  58. data/spec/handler_spec.rb +0 -108
@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA1:
3
+ metadata.gz: b7f3a4c3a01072ac60acedf5e31aeaeb2bdd2351
4
+ data.tar.gz: 42d514af94d97f883fc45ac685cd763ee479a2a3
5
+ SHA512:
6
+ metadata.gz: f96d1730de67f843d1f45ee0806007b9041351e739b6af14596b0e8df7387f6e74d8f6912162fc83cc5b959ac53ed02afd88c115c64d743274948dfcdbfa4550
7
+ data.tar.gz: 13db92095eee835579880064ee7c986f369a9a9b66225ff0e8d1054d5e2a35e04bb237a9c0f82e8406fe5a66a761af14e2ed61b214381559c1397d87e59fedc8
@@ -0,0 +1,3 @@
1
+ *.gem
2
+ Gemfile.lock
3
+ spec/store.yaml
@@ -0,0 +1,48 @@
1
+ language:
2
+ ruby
3
+
4
+ before_install:
5
+ gem install bundler
6
+
7
+ script:
8
+ bundle exec rake spec
9
+
10
+ rvm:
11
+ - ruby-head
12
+ - 2.0.0
13
+ - 1.9.3
14
+ - 1.9.2
15
+ - 1.8.7
16
+ - rbx-19mode
17
+ - rbx-18mode
18
+ - jruby-head
19
+ - jruby-19mode
20
+ - jruby-18mode
21
+ - ree
22
+
23
+ env:
24
+ - YAMLER=syck
25
+ - YAMLER=psych
26
+
27
+ matrix:
28
+ allow_failures:
29
+ - rvm: ruby-head
30
+ - rvm: rbx-19mode
31
+ - rvm: rbx-18mode
32
+ - rvm: jruby-head
33
+ - rvm: ree
34
+
35
+ exclude:
36
+ - rvm: 1.8.7
37
+ env: YAMLER=psych
38
+ - rvm: jruby-head
39
+ env: YAMLER=syck
40
+ - rvm: jruby-19mode
41
+ env: YAMLER=syck
42
+ - rvm: jruby-18mode
43
+ env: YAMLER=syck
44
+
45
+ branches:
46
+ only:
47
+ - master
48
+
@@ -0,0 +1,154 @@
1
+ 1.0.5
2
+ -----
3
+
4
+ - fixed [#80](https://github.com/dtao/safe_yaml/issues/80): uninitialized constant DateTime
5
+
6
+ 1.0.2
7
+ -----
8
+
9
+ - added warning when using Psych + an older version of libyaml
10
+
11
+ 1.0.1
12
+ -----
13
+
14
+ - fixed handling for strings that look like (invalid) dates
15
+
16
+ 1.0.0
17
+ -----
18
+
19
+ - updated date parsing to use local timezone
20
+ - **now requiring "safe_yaml/load" provides `SafeYAML.load` without clobbering `YAML`**
21
+ - fixed handling of empty files
22
+ - fixed some (edge case) integer parsing bugs
23
+ - fixed some JRuby-specific issues
24
+
25
+ 0.9.7
26
+ -----
27
+
28
+ - made handling of document frontmatter more robust
29
+ - added more descriptive message to the warning for omitting the :safe option
30
+
31
+ 0.9.6
32
+ -----
33
+
34
+ - fixed handling of files with trailing content (after closing `---`)
35
+
36
+ 0.9.5
37
+ -----
38
+
39
+ - fixed permissions AGAIN
40
+
41
+ 0.9.4
42
+ -----
43
+
44
+ - corrected handling of symbols
45
+
46
+ 0.9.3
47
+ -----
48
+
49
+ - fixed permissions :(
50
+
51
+ 0.9.2
52
+ -----
53
+
54
+ - fixed error w/ parsing "!" when whitelisting tags
55
+ - fixed parsing of the number 0 (d'oh!)
56
+
57
+ 0.9.1
58
+ -----
59
+
60
+ - added Yecht support (JRuby)
61
+ - more bug fixes
62
+
63
+ 0.9.0
64
+ -----
65
+
66
+ - added `whitelist!` method for easily whitelisting tags
67
+ - added support for call-specific options
68
+ - removed deprecated methods
69
+
70
+ 0.8.6
71
+ -----
72
+
73
+ - fixed bug in float matcher
74
+
75
+ 0.8.5
76
+ -----
77
+
78
+ - performance improvements
79
+ - made less verbose by default
80
+ - bug fixes
81
+
82
+ 0.8.4
83
+ -----
84
+
85
+ - enhancements to parsing of integers, floats, and dates
86
+ - updated built-in whitelist
87
+ - more bug fixes
88
+
89
+ 0.8.3
90
+ -----
91
+
92
+ - fixed exception on parsing empty document
93
+ - fixed handling of octal & hexadecimal numbers
94
+
95
+ 0.8.2
96
+ -----
97
+
98
+ - bug fixes
99
+
100
+ 0.8.1
101
+ -----
102
+
103
+ - added `:raise_on_unknown_tag` option
104
+ - renamed `reset_defaults!` to `restore_defaults!`
105
+
106
+ 0.8
107
+ ---
108
+
109
+ - added tag whitelisting
110
+ - more API changes
111
+
112
+ 0.7
113
+ ---
114
+
115
+ - separated YAML engine support from Ruby version
116
+ - added support for binary scalars
117
+ - numerous bug fixes and enhancements
118
+
119
+ 0.6
120
+ ---
121
+
122
+ - several API changes
123
+ - added `SafeYAML::OPTIONS` for specifying default behavior
124
+
125
+ 0.5
126
+ ---
127
+
128
+ Added support for dates
129
+
130
+ 0.4
131
+ ---
132
+
133
+ - efficiency improvements
134
+ - made `YAML.load` use `YAML.safe_load` by default
135
+ - made symbol deserialization optional
136
+
137
+ 0.3
138
+ ---
139
+
140
+ Added Syck support
141
+
142
+ 0.2
143
+ ---
144
+
145
+ Added support for:
146
+
147
+ - anchors & aliases
148
+ - booleans
149
+ - nils
150
+
151
+ 0.1
152
+ ---
153
+
154
+ Initial release
data/Gemfile CHANGED
@@ -1,9 +1,11 @@
1
- source :rubygems
1
+ source "https://rubygems.org"
2
2
 
3
3
  gemspec
4
4
 
5
5
  group :development do
6
+ gem "hashie"
6
7
  gem "heredoc_unindent"
7
8
  gem "rake"
8
9
  gem "rspec"
10
+ gem "travis-lint"
9
11
  end
@@ -0,0 +1,22 @@
1
+ Copyright (c) 2013 Dan Tao
2
+
3
+ MIT License
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining
6
+ a copy of this software and associated documentation files (the
7
+ "Software"), to deal in the Software without restriction, including
8
+ without limitation the rights to use, copy, modify, merge, publish,
9
+ distribute, sublicense, and/or sell copies of the Software, and to
10
+ permit persons to whom the Software is furnished to do so, subject to
11
+ the following conditions:
12
+
13
+ The above copyright notice and this permission notice shall be
14
+ included in all copies or substantial portions of the Software.
15
+
16
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
17
+ EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
18
+ MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
19
+ NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
20
+ LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
21
+ OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
22
+ WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
@@ -0,0 +1,191 @@
1
+ SafeYAML
2
+ ========
3
+
4
+ [![Build Status](https://travis-ci.org/dtao/safe_yaml.png)](http://travis-ci.org/dtao/safe_yaml)
5
+ [![Gem Version](https://badge.fury.io/rb/safe_yaml.png)](http://badge.fury.io/rb/safe_yaml)
6
+
7
+ The **SafeYAML** gem provides an alternative implementation of `YAML.load` suitable for accepting user input in Ruby applications. Unlike Ruby's built-in implementation of `YAML.load`, SafeYAML's version will not expose apps to arbitrary code execution exploits (such as [the ones discovered](http://www.reddit.com/r/netsec/comments/167c11/serious_vulnerability_in_ruby_on_rails_allowing/) [in Rails in early 2013](http://www.h-online.com/open/news/item/Rails-developers-close-another-extremely-critical-flaw-1793511.html)).
8
+
9
+ **If you encounter any issues with SafeYAML, check out the 'Common Issues' section below.** If you don't see anything that addresses the problem you're experiencing, by all means, [create an issue](https://github.com/dtao/safe_yaml/issues/new)!
10
+
11
+ Installation
12
+ ------------
13
+
14
+ Add this line to your application's Gemfile:
15
+
16
+ ```ruby
17
+ gem "safe_yaml"
18
+ ```
19
+
20
+ Configuration
21
+ -------------
22
+
23
+ If *all you do* is add SafeYAML to your project, then `YAML.load` will operate in "safe" mode, which means it won't deserialize arbitrary objects. However, it will issue a warning the first time you call it because you haven't explicitly specified whether you want safe or unsafe behavior by default. To specify this behavior (e.g., in a Rails initializer):
24
+
25
+ ```ruby
26
+ SafeYAML::OPTIONS[:default_mode] = :safe # or :unsafe
27
+ ```
28
+
29
+ Another important option you might want to specify on startup is whether or not to allow *symbols* to be deserialized. The default setting is `false`, since symbols are not garbage collected in Ruby and so deserializing them from YAML may render your application vulnerable to a DOS (denial of service) attack. To allow symbol deserialization by default:
30
+
31
+ ```ruby
32
+ SafeYAML::OPTIONS[:deserialize_symbols] = true
33
+ ```
34
+
35
+ For more information on these and other options, see the "Usage" section down below.
36
+
37
+ What is this gem for, exactly?
38
+ ------------------------------
39
+
40
+ Suppose your application were to use a popular open source library which contained code like this:
41
+
42
+ ```ruby
43
+ class ClassBuilder
44
+ def []=(key, value)
45
+ @class ||= Class.new
46
+
47
+ @class.class_eval <<-EOS
48
+ def #{key}
49
+ #{value}
50
+ end
51
+ EOS
52
+ end
53
+
54
+ def create
55
+ @class.new
56
+ end
57
+ end
58
+ ```
59
+
60
+ Now, if you were to use `YAML.load` on user input anywhere in your application without the SafeYAML gem installed, an attacker who suspected you were using this library could send a request with a carefully-crafted YAML string to execute arbitrary code (yes, including `system("unix command")`) on your servers.
61
+
62
+ This simple example demonstrates the vulnerability:
63
+
64
+ ```ruby
65
+ yaml = <<-EOYAML
66
+ --- !ruby/hash:ClassBuilder
67
+ "foo; end; puts %(I'm in yr system!); def bar": "baz"
68
+ EOYAML
69
+ ```
70
+
71
+ > YAML.load(yaml)
72
+ I'm in yr system!
73
+ => #<ClassBuilder:0x007fdbbe2e25d8 @class=#<Class:0x007fdbbe2e2510>>
74
+
75
+ With SafeYAML, the same attacker would be thwarted:
76
+
77
+ > require "safe_yaml"
78
+ => true
79
+ > YAML.load(yaml, :safe => true)
80
+ => {"foo; end; puts %(I'm in yr system!); def bar"=>"baz"}
81
+
82
+ Usage
83
+ -----
84
+
85
+ When you require the safe_yaml gem in your project, `YAML.load` is patched to accept one additional (optional) `options` parameter. This changes the method signature as follows:
86
+
87
+ - for Syck and Psych prior to Ruby 1.9.3: `YAML.load(yaml, options={})`
88
+ - for Psych in 1.9.3 and later: `YAML.load(yaml, filename=nil, options={})`
89
+
90
+ The most important option is the `:safe` option (default: `true`), which controls whether or not to deserialize arbitrary objects when parsing a YAML document. The other options, along with explanations, are as follows.
91
+
92
+ - `:deserialize_symbols` (default: `false`): Controls whether or not YAML will deserialize symbols. It is probably best to only enable this option where necessary, e.g. to make trusted libraries work. Symbols receive special treatment in Ruby and are not garbage collected, which means deserializing them indiscriminately may render your site vulnerable to a DOS attack.
93
+
94
+ - `:whitelisted_tags`: Accepts an array of YAML tags that designate trusted types, e.g., ones that can be deserialized without worrying about any resulting security vulnerabilities. When any of the given tags are encountered in a YAML document, the associated data will be parsed by the underlying YAML engine (Syck or Psych) for the version of Ruby you are using. See the "Whitelisting Trusted Types" section below for more information.
95
+
96
+ - `:custom_initializers`: Similar to the `:whitelisted_tags` option, but allows you to provide your own initializers for specified tags rather than using Syck or Psyck. Accepts a hash with string tags for keys and lambdas for values.
97
+
98
+ - `:raise_on_unknown_tag` (default: `false`): Represents the highest possible level of paranoia. If the YAML engine encounters any tag other than ones that are automatically trusted by SafeYAML or that you've explicitly whitelisted, it will raise an exception. This may be a good choice if you expect to always be dealing with perfectly safe YAML and want your application to fail loudly upon encountering questionable data.
99
+
100
+ All of the above options can be set at the global level via `SafeYAML::OPTIONS`. You can also set each one individually per call to `YAML.load`; an option explicitly passed to `load` will take precedence over an option specified globally.
101
+
102
+ What if I don't *want* to patch `YAML`?
103
+ ---------------------------------------
104
+
105
+ [Excellent question](https://github.com/dtao/safe_yaml/issues/47)! You can also get the methods `SafeYAML.load` and `SafeYAML.load_file` without touching the `YAML` module at all like this:
106
+
107
+ ```ruby
108
+ require "safe_yaml/load" # instead of require "safe_yaml"
109
+ ```
110
+
111
+ This way, you can use `SafeYAML.load` to parse YAML that *you* don't trust, without affecting the rest of an application (if you're developing a library, for example).
112
+
113
+ Supported Types
114
+ ---------------
115
+
116
+ The way that SafeYAML works is by restricting the kinds of objects that can be deserialized via `YAML.load`. More specifically, only the following types of objects can be deserialized by default:
117
+
118
+ - Hashes
119
+ - Arrays
120
+ - Strings
121
+ - Numbers
122
+ - Dates
123
+ - Times
124
+ - Booleans
125
+ - Nils
126
+
127
+ Again, deserialization of symbols can be enabled globally by setting `SafeYAML::OPTIONS[:deserialize_symbols] = true`, or in a specific call to `YAML.load([some yaml], :deserialize_symbols => true)`.
128
+
129
+ Whitelisting Trusted Types
130
+ --------------------------
131
+
132
+ SafeYAML supports whitelisting certain YAML tags for trusted types. This is handy when your application uses YAML to serialize and deserialize certain types not listed above, which you know to be free of any deserialization-related vulnerabilities.
133
+
134
+ The easiest way to whitelist types is by calling `SafeYAML.whitelist!`, which can accept a variable number of safe types, e.g.:
135
+
136
+ ```ruby
137
+ SafeYAML.whitelist!(Foo, Bar)
138
+ ```
139
+
140
+ You can also whitelist YAML *tags* via the `:whitelisted_tags` option:
141
+
142
+ ```ruby
143
+ # Using Syck
144
+ SafeYAML::OPTIONS[:whitelisted_tags] = ["tag:ruby.yaml.org,2002:object:OpenStruct"]
145
+
146
+ # Using Psych
147
+ SafeYAML::OPTIONS[:whitelisted_tags] = ["!ruby/object:OpenStruct"]
148
+ ```
149
+
150
+ And in case you were wondering: no, this feature will *not* allow would-be attackers to embed untrusted types within trusted types:
151
+
152
+ ```ruby
153
+ yaml = <<-EOYAML
154
+ --- !ruby/object:OpenStruct
155
+ table:
156
+ :backdoor: !ruby/hash:ClassBuilder
157
+ "foo; end; puts %(I'm in yr system!); def bar": "baz"
158
+ EOYAML
159
+ ```
160
+
161
+ > YAML.safe_load(yaml)
162
+ => #<OpenStruct :backdoor={"foo; end; puts %(I'm in yr system!); def bar"=>"baz"}>
163
+
164
+ Known Issues
165
+ ------------
166
+
167
+ If you add SafeYAML to your project and start seeing any errors about missing keys, or you notice mysterious strings that look like `":foo"` (i.e., start with a colon), it's likely you're seeing errors from symbols being saved in YAML format. If you are able to modify the offending code, you might want to consider changing your YAML content to use plain vanilla strings instead of symbols. If not, you may need to set the `:deserialize_symbols` option to `true`, either in calls to `YAML.load` or---as a last resort---globally, with `SafeYAML::OPTIONS[:deserialize_symbols]`.
168
+
169
+ Also be aware that some Ruby libraries, particularly those requiring inter-process communication, leverage YAML's object deserialization functionality and therefore may break or otherwise be impacted by SafeYAML. The following list includes known instances of SafeYAML's interaction with other Ruby gems:
170
+
171
+ - [**ActiveRecord**](https://github.com/rails/rails/tree/master/activerecord): uses YAML to control serialization of model objects using the `serialize` class method. If you find that accessing serialized properties on your ActiveRecord models is causing errors, chances are you may need to:
172
+ 1. set the `:deserialize_symbols` option to `true`,
173
+ 2. whitelist some of the types in your serialized data via `SafeYAML.whitelist!` or the `:whitelisted_tags` option, or
174
+ 3. both
175
+ - [**delayed_job**](https://github.com/collectiveidea/delayed_job): Uses YAML to serialize the objects on which delayed methods are invoked (with `delay`). The safest solution in this case is to use `SafeYAML.whitelist!` to whitelist the types you need to serialize.
176
+ - [**Guard**](https://github.com/guard/guard): Uses YAML as a serialization format for notifications. The data serialized uses symbolic keys, so setting `SafeYAML::OPTIONS[:deserialize_symbols] = true` is necessary to allow Guard to work.
177
+ - [**sidekiq**](https://github.com/mperham/sidekiq): Uses a YAML configiuration file with symbolic keys, so setting `SafeYAML::OPTIONS[:deserialize_symbols] = true` should allow it to work.
178
+
179
+ The above list will grow over time, as more issues are discovered.
180
+
181
+ Versioning
182
+ ----------
183
+
184
+ SafeYAML will follow [semantic versioning](http://semver.org/) so any updates to the first major version will maintain backwards compatability. So expect primarily bug fixes and feature enhancements (if anything!) from here on out... unless it makes sense to break the interface at some point and introduce a version 2.0, which I honestly think is unlikely.
185
+
186
+ Requirements
187
+ ------------
188
+
189
+ SafeYAML requires Ruby 1.8.7 or newer and works with both [Syck](http://www.ruby-doc.org/stdlib-1.8.7/libdoc/yaml/rdoc/YAML.html) and [Psych](http://github.com/tenderlove/psych).
190
+
191
+ If you are using a version of Ruby where Psych is the default YAML engine (e.g., 1.9.3) but you want to use Syck, be sure to set `YAML::ENGINE.yamler = "syck"` **before** requiring the safe_yaml gem.
data/Rakefile CHANGED
@@ -1,6 +1,26 @@
1
1
  require "rspec/core/rake_task"
2
2
 
3
3
  desc "Run specs"
4
- RSpec::Core::RakeTask.new(:spec) do |t|
5
- t.rspec_opts = %w(--color --format d)
4
+ task :spec => ['spec:app', 'spec:lib']
5
+
6
+ namespace :spec do
7
+ desc "Run only specs tagged 'solo'"
8
+ RSpec::Core::RakeTask.new(:solo) do |t|
9
+ t.verbose = false
10
+ t.rspec_opts = %w(--color --tag solo)
11
+ end
12
+
13
+ desc "Run only specs tagged NOT tagged 'libraries' (for applications)"
14
+ RSpec::Core::RakeTask.new(:app) do |t|
15
+ t.verbose = false
16
+ ENV["MONKEYPATCH_YAML"] = "true"
17
+ t.rspec_opts = %w(--color --tag ~libraries)
18
+ end
19
+
20
+ desc "Run only specs tagged 'libraries'"
21
+ RSpec::Core::RakeTask.new(:lib) do |t|
22
+ t.verbose = false
23
+ ENV["MONKEYPATCH_YAML"] = "false"
24
+ t.rspec_opts = %w(--color --tag libraries)
25
+ end
6
26
  end