[tor-commits] [tor-browser] 29/43: Bug 1730434 - Limit length of allowCredentials set. r=dveditz, a=RyanVM
gitolite role
git at cupani.torproject.org
Tue May 31 07:07:12 UTC 2022
This is an automated email from the git hooks/post-receive script.
pierov pushed a commit to branch tor-browser-91.10.0esr-11.0-1
in repository tor-browser.
commit 629ac9b84cfd185e52eafc8292f929c111052322
Author: R. Martinho Fernandes <bugs at rmf.io>
AuthorDate: Thu May 12 15:21:31 2022 +0000
Bug 1730434 - Limit length of allowCredentials set. r=dveditz, a=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D145228
---
dom/webauthn/WebAuthnManager.cpp | 8 ++++++++
dom/webauthn/tests/test_webauthn_get_assertion.html | 17 +++++++++++++++++
2 files changed, 25 insertions(+)
diff --git a/dom/webauthn/WebAuthnManager.cpp b/dom/webauthn/WebAuthnManager.cpp
index d5de8579efba5..3941ba60a73ec 100644
--- a/dom/webauthn/WebAuthnManager.cpp
+++ b/dom/webauthn/WebAuthnManager.cpp
@@ -447,6 +447,8 @@ already_AddRefed<Promise> WebAuthnManager::MakeCredential(
return promise.forget();
}
+const size_t MAX_ALLOWED_CREDENTIALS = 20;
+
already_AddRefed<Promise> WebAuthnManager::GetAssertion(
const PublicKeyCredentialRequestOptions& aOptions,
const Optional<OwningNonNull<AbortSignal>>& aSignal) {
@@ -520,6 +522,12 @@ already_AddRefed<Promise> WebAuthnManager::GetAssertion(
return promise.forget();
}
+ // Abort the request if the allowCredentials set is too large
+ if (aOptions.mAllowCredentials.Length() > MAX_ALLOWED_CREDENTIALS) {
+ promise->MaybeReject(NS_ERROR_DOM_SECURITY_ERR);
+ return promise.forget();
+ }
+
// Use assertionChallenge, callerOrigin and rpId, along with the token binding
// key associated with callerOrigin (if any), to create a ClientData structure
// representing this request. Choose a hash algorithm for hashAlg and compute
diff --git a/dom/webauthn/tests/test_webauthn_get_assertion.html b/dom/webauthn/tests/test_webauthn_get_assertion.html
index 012ff95202134..ec5b7e6084c66 100644
--- a/dom/webauthn/tests/test_webauthn_get_assertion.html
+++ b/dom/webauthn/tests/test_webauthn_get_assertion.html
@@ -54,6 +54,10 @@
ok(aResult.toString().startsWith("TypeError"), "Expecting a TypeError, got " + aResult);
}
+ function expectSecurityError(aResult) {
+ ok(aResult.toString().startsWith("SecurityError"), "Expecting a SecurityError, got " + aResult);
+ }
+
function expectAbortError(aResult) {
is(aResult.code, DOMException.ABORT_ERR, "Expecting an AbortError");
}
@@ -172,6 +176,19 @@
.catch(expectInvalidStateError);
});
+ // Test with too many credentials
+ add_task(async () => {
+ let tooManyCredentials = Array(21).fill(validCred);
+ let publicKey = {
+ challenge: gAssertionChallenge,
+ allowCredentials: tooManyCredentials,
+ };
+
+ await requestGetAssertion({publicKey})
+ .then(arrivingHereIsBad)
+ .catch(expectSecurityError);
+ });
+
// Test with an unexpected option and an invalid credential
add_task(async () => {
let publicKey = {
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
More information about the tor-commits
mailing list