This project does not seem to handle request data directly as such no vulnerable execution paths were found.
include
, or for example
via PHP's auto-loading mechanism.
These results are based on our legacy PHP analysis, consider migrating to our new PHP analysis engine instead. Learn more
1 | <?php |
||
2 | /** |
||
3 | * JWT powered User for Yii 2 |
||
4 | * |
||
5 | * @see https://github.com/sergeymakinen/yii2-jwt-user |
||
6 | * @copyright Copyright (c) 2016-2017 Sergey Makinen (https://makinen.ru) |
||
7 | * @license https://github.com/sergeymakinen/yii2-jwt-user/blob/master/LICENSE MIT License |
||
8 | */ |
||
9 | |||
10 | namespace sergeymakinen\yii\jwtuser; |
||
11 | |||
12 | use Lcobucci\JWT\Builder; |
||
13 | use Lcobucci\JWT\Parser; |
||
14 | use Lcobucci\JWT\Signer\Hmac\Sha256; |
||
15 | use Lcobucci\JWT\Token; |
||
16 | use Lcobucci\JWT\ValidationData; |
||
17 | use yii\base\InvalidValueException; |
||
18 | use yii\web\Cookie; |
||
19 | use yii\web\IdentityInterface; |
||
20 | |||
21 | /** |
||
22 | * User class with a JWT cookie as a backend. |
||
23 | * |
||
24 | * @see https://jwt.io |
||
25 | * @see https://tools.ietf.org/html/rfc7519 |
||
26 | * @see \yii\web\User |
||
27 | */ |
||
28 | class User extends \yii\web\User |
||
29 | { |
||
30 | /** |
||
31 | * @var string JWT sign key. Must be random and secret. |
||
32 | * @see https://tools.ietf.org/html/rfc7519#section-11 |
||
33 | * @since 3.0 |
||
34 | */ |
||
35 | public $key; |
||
36 | |||
37 | /** |
||
38 | * @var bool whether to use a [[IdentityInterface::getAuthKey()]] value to validate a token. |
||
39 | * @since 3.0 |
||
40 | */ |
||
41 | public $useAuthKey = true; |
||
42 | |||
43 | /** |
||
44 | * @var bool whether to append a [[IdentityInterface::getAuthKey()]] value to the sign key or store it as a claim. |
||
45 | * @since 3.0 |
||
46 | */ |
||
47 | public $appendAuthKey = false; |
||
48 | |||
49 | /** |
||
50 | * @var \Closure|string JWT audience claim ("aud"). |
||
51 | * @see https://tools.ietf.org/html/rfc7519#section-4.1.3 |
||
52 | * @since 1.1 |
||
53 | */ |
||
54 | public $audience; |
||
55 | |||
56 | /** |
||
57 | * @var \Closure|string JWT issuer claim ("iss"). |
||
58 | * @see https://tools.ietf.org/html/rfc7519#section-4.1.1 |
||
59 | * @since 3.0 |
||
60 | */ |
||
61 | public $issuer; |
||
62 | |||
63 | /** |
||
64 | * @inheritDoc |
||
65 | */ |
||
66 | 432 | protected function renewIdentityCookie() |
|
67 | { |
||
68 | try { |
||
69 | /** @var IdentityInterface $identity */ |
||
70 | /** @var Token $token */ |
||
71 | 432 | list($identity, $token) = $this->getIdentityAndTokenFromCookie(); |
|
72 | 216 | if ($identity === null) { |
|
73 | 216 | return; |
|
74 | } |
||
75 | 216 | } catch (\Exception $e) { |
|
76 | 216 | if ($e instanceof InvalidValueException) { |
|
77 | throw $e; |
||
78 | } |
||
79 | |||
80 | 216 | return; |
|
81 | } |
||
82 | 216 | $now = time(); |
|
83 | 216 | $builder = $this->createBuilderFromToken($token) |
|
84 | 216 | ->setNotBefore($now); |
|
85 | 216 | if ($token->hasClaim('exp')) { |
|
86 | 162 | $builder->setExpiration($now + ($token->getClaim('exp') - $token->getClaim('nbf'))); |
|
87 | } |
||
88 | 216 | $this->sendToken($builder, $identity); |
|
89 | 216 | } |
|
90 | |||
91 | /** |
||
92 | * @inheritDoc |
||
93 | */ |
||
94 | 432 | protected function sendIdentityCookie($identity, $duration) |
|
95 | { |
||
96 | 432 | $now = time(); |
|
97 | 432 | $builder = (new Builder()) |
|
98 | 432 | ->setIssuedAt($now) |
|
99 | 432 | ->setNotBefore($now) |
|
100 | 432 | ->setId($identity->getId()); |
|
101 | 432 | if ($duration > 0) { |
|
102 | 324 | $builder->setExpiration($now + $duration); |
|
103 | } |
||
104 | 432 | $issuer = $this->getPrincipal($this->issuer); |
|
105 | 432 | if ($issuer !== null) { |
|
106 | 432 | $builder->setIssuer($issuer); |
|
107 | } |
||
108 | 432 | $audience = $this->getPrincipal($this->audience); |
|
109 | 432 | if ($audience !== null) { |
|
110 | 432 | $builder->setAudience($audience); |
|
111 | } |
||
112 | 432 | if ($this->useAuthKey && !$this->appendAuthKey) { |
|
113 | 144 | $builder->set('authKey', $identity->getAuthKey()); |
|
114 | } |
||
115 | 432 | $this->sendToken($builder, $identity); |
|
116 | 432 | } |
|
117 | |||
118 | /** |
||
119 | * @inheritDoc |
||
120 | */ |
||
121 | 768 | protected function getIdentityAndDurationFromCookie() |
|
122 | { |
||
123 | try { |
||
124 | /** @var IdentityInterface $identity */ |
||
125 | /** @var Token $token */ |
||
126 | 768 | list($identity, $token) = $this->getIdentityAndTokenFromCookie(); |
|
127 | 748 | } catch (\Exception $e) { |
|
128 | 748 | if ($e instanceof InvalidValueException) { |
|
129 | throw $e; |
||
130 | } |
||
131 | |||
132 | 748 | $ip = \Yii::$app->getRequest()->getUserIP(); |
|
133 | 748 | $error = lcfirst($e->getMessage()); |
|
134 | 748 | \Yii::warning("Invalid JWT cookie from $ip: $error", __METHOD__); |
|
135 | 748 | $this->removeIdentityCookie(); |
|
136 | 748 | return null; |
|
137 | } |
||
138 | 20 | if ($identity === null) { |
|
139 | 4 | $this->removeIdentityCookie(); |
|
140 | 4 | return null; |
|
141 | } |
||
142 | |||
143 | 16 | return ['identity' => $identity, 'duration' => $token->hasClaim('exp') ? $token->getClaim('exp') - $token->getClaim('nbf') : 0]; |
|
144 | } |
||
145 | |||
146 | /** |
||
147 | * @return array|null |
||
148 | */ |
||
149 | 1974 | private function getIdentityAndTokenFromCookie() |
|
150 | { |
||
151 | 1974 | $value = \Yii::$app->getRequest()->getCookies()->getValue($this->identityCookie['name']); |
|
152 | 1974 | if ($value === null) { |
|
153 | 1 | return null; |
|
154 | } |
||
155 | |||
156 | 1973 | $token = (new Parser())->parse($value); |
|
157 | 1973 | if ($this->useAuthKey && $this->appendAuthKey) { |
|
158 | 657 | $identity = $this->getIdentityFromToken($token); |
|
159 | 657 | if ($identity === null) { |
|
160 | 1 | return null; |
|
161 | } |
||
162 | |||
163 | 656 | $this->assertSignature($token, $identity); |
|
164 | 200 | $this->assertClaims($token); |
|
165 | } else { |
||
166 | 1317 | $this->assertSignature($token); |
|
167 | 658 | $this->assertClaims($token); |
|
168 | 178 | $identity = $this->getIdentityFromToken($token); |
|
169 | 177 | if ($identity === null) { |
|
170 | 9 | return null; |
|
171 | } |
||
172 | } |
||
173 | 248 | return [$identity, $token]; |
|
174 | } |
||
175 | |||
176 | /** |
||
177 | * @param \Closure|string|null $value |
||
178 | * @return string|null |
||
179 | */ |
||
180 | 1074 | private function getPrincipal($value) |
|
181 | { |
||
182 | 1074 | if (is_string($value)) { |
|
183 | 520 | return $value; |
|
184 | } |
||
185 | |||
186 | 986 | if ($value instanceof \Closure) { |
|
187 | 720 | return $value(); |
|
188 | } |
||
189 | |||
190 | 522 | return \Yii::$app->getRequest()->getHostInfo(); |
|
191 | } |
||
192 | |||
193 | /** |
||
194 | * @param IdentityInterface|null $identity |
||
195 | * @return string |
||
196 | */ |
||
197 | 1973 | private function getKey(IdentityInterface $identity = null) |
|
198 | { |
||
199 | 1973 | $key = (string) $this->key; |
|
200 | 1973 | if ($this->useAuthKey && $this->appendAuthKey) { |
|
201 | 656 | $key .= $identity->getAuthKey(); |
|
0 ignored issues
–
show
|
|||
202 | } |
||
203 | 1973 | if ($key === '') { |
|
204 | 3 | throw new InvalidValueException('Sign key cannot be empty.'); |
|
205 | } |
||
206 | |||
207 | 1970 | return $key; |
|
208 | } |
||
209 | |||
210 | /** |
||
211 | * @param Token $token |
||
212 | * @param IdentityInterface|null $identity |
||
213 | */ |
||
214 | 1973 | private function assertSignature(Token $token, IdentityInterface $identity = null) |
|
215 | { |
||
216 | 1973 | $key = $identity === null ? $this->getKey() : $this->getKey($identity); |
|
217 | 1970 | if (!$token->verify(new Sha256(), $key)) { |
|
218 | 1112 | throw new \InvalidArgumentException('Invalid signature'); |
|
219 | } |
||
220 | 858 | } |
|
221 | |||
222 | /** |
||
223 | * @param Token $token |
||
224 | */ |
||
225 | 858 | private function assertClaims(Token $token) |
|
226 | { |
||
227 | 858 | $validationData = new ValidationData(time()); |
|
228 | 858 | $issuer = $this->getPrincipal($this->issuer); |
|
229 | 858 | if ($issuer !== null) { |
|
230 | 858 | $validationData->setIssuer($issuer); |
|
231 | } |
||
232 | 858 | $audience = $this->getPrincipal($this->audience); |
|
233 | 858 | if ($audience !== null) { |
|
234 | 858 | $validationData->setAudience($audience); |
|
235 | } |
||
236 | 858 | if (!$token->validate($validationData)) { |
|
237 | 600 | throw new \InvalidArgumentException('Invalid claims'); |
|
238 | } |
||
239 | 258 | } |
|
240 | |||
241 | /** |
||
242 | * @param Token $token |
||
243 | * @return IdentityInterface|null |
||
244 | */ |
||
245 | 834 | private function getIdentityFromToken(Token $token) |
|
246 | { |
||
247 | /* @var $class IdentityInterface */ |
||
248 | 834 | $class = $this->identityClass; |
|
249 | 834 | $id = $token->getClaim('jti'); |
|
250 | 834 | $identity = $class::findIdentity($id); |
|
251 | 834 | if ($identity === null) { |
|
252 | 1 | return null; |
|
253 | } |
||
254 | |||
255 | 833 | if (!$identity instanceof IdentityInterface) { |
|
256 | 1 | throw new InvalidValueException("$class::findIdentity() must return an object implementing IdentityInterface."); |
|
257 | } |
||
258 | |||
259 | 832 | if ($this->useAuthKey && !$this->appendAuthKey) { |
|
260 | 88 | $authKey = $token->getClaim('authKey'); |
|
261 | 88 | if (!$identity->validateAuthKey($authKey)) { |
|
262 | 8 | \Yii::warning("Invalid auth key attempted for user '$id': $authKey", __METHOD__); |
|
263 | 8 | return null; |
|
264 | } |
||
265 | } |
||
266 | |||
267 | 824 | return $identity; |
|
268 | } |
||
269 | |||
270 | /** |
||
271 | * @param Token $token |
||
272 | * @return Builder |
||
273 | */ |
||
274 | 216 | private function createBuilderFromToken(Token $token) |
|
275 | { |
||
276 | 216 | $builder = new Builder(); |
|
277 | 216 | foreach (array_keys($token->getClaims()) as $name) { |
|
278 | 216 | $builder->set($name, $token->getClaim($name)); |
|
279 | } |
||
280 | 216 | return $builder; |
|
281 | } |
||
282 | |||
283 | /** |
||
284 | * @param Builder $builder |
||
285 | * @param IdentityInterface $identity |
||
286 | */ |
||
287 | 432 | private function sendToken(Builder $builder, IdentityInterface $identity) |
|
288 | { |
||
289 | 432 | $cookie = new Cookie($this->identityCookie); |
|
290 | 432 | $cookie->expire = $builder->getToken()->getClaim('exp', '0'); |
|
291 | 432 | $cookie->value = (string) $builder |
|
292 | 432 | ->sign(new Sha256(), $this->getKey($identity)) |
|
293 | 432 | ->getToken(); |
|
294 | 432 | \Yii::$app->getResponse()->getCookies()->add($cookie); |
|
295 | 432 | } |
|
296 | } |
||
297 |
If a variable is not always an object, we recommend to add an additional type check to ensure your method call is safe: