Blame SOURCES/016-fix-CVE-2022-31107.patch

f6686b
From 41a9a27cf0767828f38a390bbe7cf43f613b882e Mon Sep 17 00:00:00 2001
492e94
From: Andreas Gerstmayr <agerstmayr@redhat.com>
492e94
Date: Fri, 15 Jul 2022 14:05:14 +0200
492e94
Subject: [PATCH] fix CVE-2022-31107
492e94
492e94
backport 967e17d7ef6bc62a108add33ea699710f0e15870 from v8.4.10
492e94
492e94
Co-authored-by: Karl Persson <kalle.persson@grafana.com>
492e94
Co-authored-by: Jguer <joao.guerreiro@grafana.com>
492e94
492e94
diff --git a/pkg/api/ldap_debug.go b/pkg/api/ldap_debug.go
492e94
index 126e760b67..c9e2b606c5 100644
492e94
--- a/pkg/api/ldap_debug.go
492e94
+++ b/pkg/api/ldap_debug.go
492e94
@@ -215,6 +215,11 @@ func (hs *HTTPServer) PostSyncUserWithLDAP(c *models.ReqContext) response.Respon
492e94
 		ReqContext:    c,
492e94
 		ExternalUser:  user,
492e94
 		SignupAllowed: hs.Cfg.LDAPAllowSignup,
492e94
+		UserLookupParams: models.UserLookupParams{
492e94
+			UserID: &query.Result.Id, // Upsert by ID only
492e94
+			Email:  nil,
492e94
+			Login:  nil,
492e94
+		},
492e94
 	}
492e94
 
492e94
 	err = bus.Dispatch(upsertCmd)
492e94
diff --git a/pkg/api/login_oauth.go b/pkg/api/login_oauth.go
492e94
index 1fce9b6f61..611d51444f 100644
492e94
--- a/pkg/api/login_oauth.go
492e94
+++ b/pkg/api/login_oauth.go
492e94
@@ -250,6 +250,11 @@ func syncUser(
492e94
 		ReqContext:    ctx,
492e94
 		ExternalUser:  extUser,
492e94
 		SignupAllowed: connect.IsSignupAllowed(),
492e94
+		UserLookupParams: models.UserLookupParams{
492e94
+			Email:  &extUser.Email,
492e94
+			UserID: nil,
492e94
+			Login:  nil,
492e94
+		},
492e94
 	}
492e94
 	if err := bus.Dispatch(cmd); err != nil {
492e94
 		return nil, err
492e94
diff --git a/pkg/login/ldap_login.go b/pkg/login/ldap_login.go
492e94
index cb5d984e73..82dac2ee9e 100644
492e94
--- a/pkg/login/ldap_login.go
492e94
+++ b/pkg/login/ldap_login.go
492e94
@@ -56,9 +56,13 @@ var loginUsingLDAP = func(query *models.LoginUserQuery) (bool, error) {
492e94
 		ReqContext:    query.ReqContext,
492e94
 		ExternalUser:  externalUser,
492e94
 		SignupAllowed: setting.LDAPAllowSignup,
492e94
+		UserLookupParams: models.UserLookupParams{
492e94
+			Login:  &externalUser.Login,
492e94
+			Email:  &externalUser.Email,
492e94
+			UserID: nil,
492e94
+		},
492e94
 	}
492e94
-	err = bus.Dispatch(upsert)
492e94
-	if err != nil {
492e94
+	if err = bus.Dispatch(upsert); err != nil {
492e94
 		return true, err
492e94
 	}
492e94
 	query.User = upsert.Result
492e94
diff --git a/pkg/models/user_auth.go b/pkg/models/user_auth.go
492e94
index 2061cf048b..a98efe659e 100644
492e94
--- a/pkg/models/user_auth.go
492e94
+++ b/pkg/models/user_auth.go
492e94
@@ -54,11 +54,11 @@ type RequestURIKey struct{}
492e94
 // COMMANDS
492e94
 
492e94
 type UpsertUserCommand struct {
492e94
-	ReqContext    *ReqContext
492e94
-	ExternalUser  *ExternalUserInfo
492e94
+	ReqContext   *ReqContext
492e94
+	ExternalUser *ExternalUserInfo
492e94
+	UserLookupParams
492e94
+	Result        *User
492e94
 	SignupAllowed bool
492e94
-
492e94
-	Result *User
492e94
 }
492e94
 
492e94
 type SetAuthInfoCommand struct {
492e94
@@ -95,13 +95,18 @@ type LoginUserQuery struct {
492e94
 type GetUserByAuthInfoQuery struct {
492e94
 	AuthModule string
492e94
 	AuthId     string
492e94
-	UserId     int64
492e94
-	Email      string
492e94
-	Login      string
492e94
+	UserLookupParams
492e94
 
492e94
 	Result *User
492e94
 }
492e94
 
492e94
+type UserLookupParams struct {
492e94
+	// Describes lookup order as well
492e94
+	UserID *int64  // if set, will try to find the user by id
492e94
+	Email  *string // if set, will try to find the user by email
492e94
+	Login  *string // if set, will try to find the user by login
492e94
+}
492e94
+
492e94
 type GetExternalUserInfoByLoginQuery struct {
492e94
 	LoginOrEmail string
492e94
 
492e94
diff --git a/pkg/services/contexthandler/authproxy/authproxy.go b/pkg/services/contexthandler/authproxy/authproxy.go
492e94
index 80e5a5b9e0..0d834748a7 100644
492e94
--- a/pkg/services/contexthandler/authproxy/authproxy.go
492e94
+++ b/pkg/services/contexthandler/authproxy/authproxy.go
492e94
@@ -246,6 +246,11 @@ func (auth *AuthProxy) LoginViaLDAP() (int64, error) {
492e94
 		ReqContext:    auth.ctx,
492e94
 		SignupAllowed: auth.cfg.LDAPAllowSignup,
492e94
 		ExternalUser:  extUser,
492e94
+		UserLookupParams: models.UserLookupParams{
492e94
+			Login:  &extUser.Login,
492e94
+			Email:  &extUser.Email,
492e94
+			UserID: nil,
492e94
+		},
492e94
 	}
492e94
 	if err := bus.Dispatch(upsert); err != nil {
492e94
 		return 0, err
492e94
@@ -288,6 +293,11 @@ func (auth *AuthProxy) LoginViaHeader() (int64, error) {
492e94
 		ReqContext:    auth.ctx,
492e94
 		SignupAllowed: auth.cfg.AuthProxyAutoSignUp,
492e94
 		ExternalUser:  extUser,
492e94
+		UserLookupParams: models.UserLookupParams{
492e94
+			UserID: nil,
492e94
+			Login:  &extUser.Login,
492e94
+			Email:  &extUser.Email,
492e94
+		},
492e94
 	}
492e94
 
492e94
 	err := bus.Dispatch(upsert)
492e94
diff --git a/pkg/services/login/login.go b/pkg/services/login/login.go
492e94
index 9e08a36b06..b74d1d3e8f 100644
492e94
--- a/pkg/services/login/login.go
492e94
+++ b/pkg/services/login/login.go
492e94
@@ -37,11 +37,9 @@ func (ls *LoginService) UpsertUser(cmd *models.UpsertUserCommand) error {
492e94
 	extUser := cmd.ExternalUser
492e94
 
492e94
 	userQuery := &models.GetUserByAuthInfoQuery{
492e94
-		AuthModule: extUser.AuthModule,
492e94
-		AuthId:     extUser.AuthId,
492e94
-		UserId:     extUser.UserId,
492e94
-		Email:      extUser.Email,
492e94
-		Login:      extUser.Login,
492e94
+		AuthModule:       extUser.AuthModule,
492e94
+		AuthId:           extUser.AuthId,
492e94
+		UserLookupParams: cmd.UserLookupParams,
492e94
 	}
492e94
 	if err := bus.Dispatch(userQuery); err != nil {
492e94
 		if !errors.Is(err, models.ErrUserNotFound) {
492e94
diff --git a/pkg/services/login/login_test.go b/pkg/services/login/login_test.go
492e94
index 04953b567a..dd84ee29c8 100644
492e94
--- a/pkg/services/login/login_test.go
492e94
+++ b/pkg/services/login/login_test.go
492e94
@@ -82,10 +82,12 @@ func Test_teamSync(t *testing.T) {
492e94
 		QuotaService: &quota.QuotaService{},
492e94
 	}
492e94
 
492e94
-	upserCmd := &models.UpsertUserCommand{ExternalUser: &models.ExternalUserInfo{Email: "test_user@example.org"}}
492e94
+	email := "test_user@example.org"
492e94
+	upserCmd := &models.UpsertUserCommand{ExternalUser: &models.ExternalUserInfo{Email: email},
492e94
+		UserLookupParams: models.UserLookupParams{Email: &email}}
492e94
 	expectedUser := &models.User{
492e94
 		Id:    1,
492e94
-		Email: "test_user@example.org",
492e94
+		Email: email,
492e94
 		Name:  "test_user",
492e94
 		Login: "test_user",
492e94
 	}
492e94
diff --git a/pkg/services/sqlstore/user_auth.go b/pkg/services/sqlstore/user_auth.go
f6686b
index 9605ccce76..f6f0e510bc 100644
492e94
--- a/pkg/services/sqlstore/user_auth.go
492e94
+++ b/pkg/services/sqlstore/user_auth.go
492e94
@@ -40,11 +40,12 @@ func GetUserByAuthInfo(query *models.GetUserByAuthInfoQuery) error {
492e94
 			}
492e94
 
492e94
 			// if user id was specified and doesn't match the user_auth entry, remove it
492e94
-			if query.UserId != 0 && query.UserId != authQuery.Result.UserId {
492e94
-				err = DeleteAuthInfo(&models.DeleteAuthInfoCommand{
492e94
+			if query.UserLookupParams.UserID != nil &&
492e94
+				*query.UserLookupParams.UserID != 0 &&
492e94
+				*query.UserLookupParams.UserID != authQuery.Result.UserId {
492e94
+				if err := DeleteAuthInfo(&models.DeleteAuthInfoCommand{
492e94
 					UserAuth: authQuery.Result,
492e94
-				})
492e94
-				if err != nil {
492e94
+				}); err != nil {
492e94
 					sqlog.Error("Error removing user_auth entry", "error", err)
492e94
 				}
492e94
 
492e94
@@ -70,17 +71,18 @@ func GetUserByAuthInfo(query *models.GetUserByAuthInfoQuery) error {
492e94
 		}
492e94
 	}
492e94
 
492e94
+	params := query.UserLookupParams
492e94
 	// If not found, try to find the user by id
492e94
-	if !has && query.UserId != 0 {
492e94
-		has, err = x.Id(query.UserId).Get(user)
492e94
+	if !has && params.UserID != nil && *params.UserID != 0 {
492e94
+		has, err = x.Id(*params.UserID).Get(user)
492e94
 		if err != nil {
492e94
 			return err
492e94
 		}
492e94
 	}
492e94
 
492e94
 	// If not found, try to find the user by email address
492e94
-	if !has && query.Email != "" {
492e94
-		user = &models.User{Email: query.Email}
492e94
+	if !has && params.Email != nil && *params.Email != "" {
492e94
+		user = &models.User{Email: *params.Email}
492e94
 		has, err = x.Get(user)
492e94
 		if err != nil {
492e94
 			return err
492e94
@@ -88,8 +90,8 @@ func GetUserByAuthInfo(query *models.GetUserByAuthInfoQuery) error {
492e94
 	}
492e94
 
492e94
 	// If not found, try to find the user by login
492e94
-	if !has && query.Login != "" {
492e94
-		user = &models.User{Login: query.Login}
492e94
+	if !has && params.Login != nil && *params.Login != "" {
492e94
+		user = &models.User{Login: *params.Login}
492e94
 		has, err = x.Get(user)
492e94
 		if err != nil {
492e94
 			return err
492e94
diff --git a/pkg/services/sqlstore/user_auth_test.go b/pkg/services/sqlstore/user_auth_test.go
492e94
index e5bb2379e5..d94ce34edb 100644
492e94
--- a/pkg/services/sqlstore/user_auth_test.go
492e94
+++ b/pkg/services/sqlstore/user_auth_test.go
492e94
@@ -45,7 +45,7 @@ func TestUserAuth(t *testing.T) {
492e94
 			// By Login
492e94
 			login := "loginuser0"
492e94
 
492e94
-			query := &models.GetUserByAuthInfoQuery{Login: login}
492e94
+			query := &models.GetUserByAuthInfoQuery{UserLookupParams: models.UserLookupParams{Login: &login}}
492e94
 			err = GetUserByAuthInfo(query)
492e94
 
492e94
 			So(err, ShouldBeNil)
492e94
@@ -54,7 +54,7 @@ func TestUserAuth(t *testing.T) {
492e94
 			// By ID
492e94
 			id := query.Result.Id
492e94
 
492e94
-			query = &models.GetUserByAuthInfoQuery{UserId: id}
492e94
+			query = &models.GetUserByAuthInfoQuery{UserLookupParams: models.UserLookupParams{UserID: &id}}
492e94
 			err = GetUserByAuthInfo(query)
492e94
 
492e94
 			So(err, ShouldBeNil)
492e94
@@ -63,7 +63,7 @@ func TestUserAuth(t *testing.T) {
492e94
 			// By Email
492e94
 			email := "user1@test.com"
492e94
 
492e94
-			query = &models.GetUserByAuthInfoQuery{Email: email}
492e94
+			query = &models.GetUserByAuthInfoQuery{UserLookupParams: models.UserLookupParams{Email: &email}}
492e94
 			err = GetUserByAuthInfo(query)
492e94
 
492e94
 			So(err, ShouldBeNil)
492e94
@@ -72,7 +72,7 @@ func TestUserAuth(t *testing.T) {
492e94
 			// Don't find nonexistent user
492e94
 			email = "nonexistent@test.com"
492e94
 
492e94
-			query = &models.GetUserByAuthInfoQuery{Email: email}
492e94
+			query = &models.GetUserByAuthInfoQuery{UserLookupParams: models.UserLookupParams{Email: &email}}
492e94
 			err = GetUserByAuthInfo(query)
492e94
 
492e94
 			So(err, ShouldEqual, models.ErrUserNotFound)
492e94
@@ -90,7 +90,7 @@ func TestUserAuth(t *testing.T) {
492e94
 			// create user_auth entry
492e94
 			login := "loginuser0"
492e94
 
492e94
-			query.Login = login
492e94
+			query.UserLookupParams.Login = &login
492e94
 			err = GetUserByAuthInfo(query)
492e94
 
492e94
 			So(err, ShouldBeNil)
492e94
@@ -104,9 +104,9 @@ func TestUserAuth(t *testing.T) {
492e94
 			So(query.Result.Login, ShouldEqual, login)
492e94
 
492e94
 			// get with non-matching id
492e94
-			id := query.Result.Id
492e94
+			idPlusOne := query.Result.Id + 1
492e94
 
492e94
-			query.UserId = id + 1
492e94
+			query.UserLookupParams.UserID = &idPlusOne
492e94
 			err = GetUserByAuthInfo(query)
492e94
 
492e94
 			So(err, ShouldBeNil)
492e94
@@ -143,7 +143,7 @@ func TestUserAuth(t *testing.T) {
492e94
 			login := "loginuser0"
492e94
 
492e94
 			// Calling GetUserByAuthInfoQuery on an existing user will populate an entry in the user_auth table
492e94
-			query := &models.GetUserByAuthInfoQuery{Login: login, AuthModule: "test", AuthId: "test"}
492e94
+			query := &models.GetUserByAuthInfoQuery{AuthModule: "test", AuthId: "test", UserLookupParams: models.UserLookupParams{Login: &login}}
492e94
 			err = GetUserByAuthInfo(query)
492e94
 
492e94
 			So(err, ShouldBeNil)
492e94
@@ -178,7 +178,7 @@ func TestUserAuth(t *testing.T) {
492e94
 			// Calling GetUserByAuthInfoQuery on an existing user will populate an entry in the user_auth table
492e94
 			// Make the first log-in during the past
492e94
 			getTime = func() time.Time { return time.Now().AddDate(0, 0, -2) }
492e94
-			query := &models.GetUserByAuthInfoQuery{Login: login, AuthModule: "test1", AuthId: "test1"}
492e94
+			query := &models.GetUserByAuthInfoQuery{AuthModule: "test1", AuthId: "test1", UserLookupParams: models.UserLookupParams{Login: &login}}
492e94
 			err = GetUserByAuthInfo(query)
492e94
 			getTime = time.Now
492e94
 
492e94
@@ -188,7 +188,7 @@ func TestUserAuth(t *testing.T) {
492e94
 			// Add a second auth module for this user
492e94
 			// Have this module's last log-in be more recent
492e94
 			getTime = func() time.Time { return time.Now().AddDate(0, 0, -1) }
492e94
-			query = &models.GetUserByAuthInfoQuery{Login: login, AuthModule: "test2", AuthId: "test2"}
492e94
+			query = &models.GetUserByAuthInfoQuery{AuthModule: "test2", AuthId: "test2", UserLookupParams: models.UserLookupParams{Login: &login}}
492e94
 			err = GetUserByAuthInfo(query)
492e94
 			getTime = time.Now
492e94
 
492e94
diff --git a/pkg/services/sqlstore/user_test.go b/pkg/services/sqlstore/user_test.go
492e94
index 7da19f0ef4..aa796ffb02 100644
492e94
--- a/pkg/services/sqlstore/user_test.go
492e94
+++ b/pkg/services/sqlstore/user_test.go
492e94
@@ -455,7 +455,7 @@ func TestUserDataAccess(t *testing.T) {
492e94
 				// Calling GetUserByAuthInfoQuery on an existing user will populate an entry in the user_auth table
492e94
 				// Make the first log-in during the past
492e94
 				getTime = func() time.Time { return time.Now().AddDate(0, 0, -2) }
492e94
-				query := &models.GetUserByAuthInfoQuery{Login: login, AuthModule: "ldap", AuthId: "ldap0"}
492e94
+				query := &models.GetUserByAuthInfoQuery{AuthModule: "ldap", AuthId: "ldap0", UserLookupParams: models.UserLookupParams{Login: &login}}
492e94
 				err := GetUserByAuthInfo(query)
492e94
 				getTime = time.Now
492e94
 
492e94
@@ -465,7 +465,7 @@ func TestUserDataAccess(t *testing.T) {
492e94
 				// Add a second auth module for this user
492e94
 				// Have this module's last log-in be more recent
492e94
 				getTime = func() time.Time { return time.Now().AddDate(0, 0, -1) }
492e94
-				query = &models.GetUserByAuthInfoQuery{Login: login, AuthModule: "oauth", AuthId: "oauth0"}
492e94
+				query = &models.GetUserByAuthInfoQuery{AuthModule: "oauth", AuthId: "oauth0", UserLookupParams: models.UserLookupParams{Login: &login}}
492e94
 				err = GetUserByAuthInfo(query)
492e94
 				getTime = time.Now
492e94
 
492e94
@@ -511,7 +511,7 @@ func TestUserDataAccess(t *testing.T) {
492e94
 					// Calling GetUserByAuthInfoQuery on an existing user will populate an entry in the user_auth table
492e94
 					// Make the first log-in during the past
492e94
 					getTime = func() time.Time { return time.Now().AddDate(0, 0, -2) }
492e94
-					query := &models.GetUserByAuthInfoQuery{Login: login, AuthModule: "ldap", AuthId: fmt.Sprint("ldap", i)}
492e94
+					query := &models.GetUserByAuthInfoQuery{AuthModule: "ldap", AuthId: fmt.Sprint("ldap", i), UserLookupParams: models.UserLookupParams{Login: &login}}
492e94
 					err := GetUserByAuthInfo(query)
492e94
 					getTime = time.Now
492e94
 
492e94
@@ -522,7 +522,7 @@ func TestUserDataAccess(t *testing.T) {
492e94
 				// Log in first user with oauth
492e94
 				login := "loginuser0"
492e94
 				getTime = func() time.Time { return time.Now().AddDate(0, 0, -1) }
492e94
-				query := &models.GetUserByAuthInfoQuery{Login: login, AuthModule: "oauth", AuthId: "oauth0"}
492e94
+				query := &models.GetUserByAuthInfoQuery{AuthModule: "oauth", AuthId: "oauth0", UserLookupParams: models.UserLookupParams{Login: &login}}
492e94
 				err := GetUserByAuthInfo(query)
492e94
 				getTime = time.Now
492e94