
org.sonar.java.checks.security.UserEnumerationCheck Maven / Gradle / Ivy
/*
* SonarQube Java
* Copyright (C) 2012-2024 SonarSource SA
* mailto:info AT sonarsource DOT com
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 3 of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with this program; if not, write to the Free Software Foundation,
* Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
*/
package org.sonar.java.checks.security;
import java.util.ArrayDeque;
import java.util.Arrays;
import java.util.Deque;
import java.util.List;
import org.sonar.check.Rule;
import org.sonar.plugins.java.api.IssuableSubscriptionVisitor;
import org.sonar.plugins.java.api.JavaFileScannerContext;
import org.sonar.plugins.java.api.semantic.MethodMatchers;
import org.sonar.plugins.java.api.tree.Arguments;
import org.sonar.plugins.java.api.tree.ExpressionTree;
import org.sonar.plugins.java.api.tree.IdentifierTree;
import org.sonar.plugins.java.api.tree.MethodInvocationTree;
import org.sonar.plugins.java.api.tree.MethodTree;
import org.sonar.plugins.java.api.tree.NewClassTree;
import org.sonar.plugins.java.api.tree.ThrowStatementTree;
import org.sonar.plugins.java.api.tree.Tree;
@Rule(key = "S5804")
public class UserEnumerationCheck extends IssuableSubscriptionVisitor {
private static final String MESSAGE = "Make sure allowing user enumeration is safe here.";
private static final String ABSTRACT_USER_DETAILS_AUTHENTICATION_PROVIDER = "org.springframework.security.authentication.dao.AbstractUserDetailsAuthenticationProvider";
private static final String SPRING_SEC_LDAP_AUTHENTICATION_PROVIDER = "org.springframework.security.ldap.authentication.LdapAuthenticationProvider";
private static final String USER_DETAILS_SERVICE = "org.springframework.security.core.userdetails.UserDetailsService";
private static final String USERNAME_NOT_FOUND_EXCEPTION = "org.springframework.security.core.userdetails.UsernameNotFoundException";
private static final String HIDE_USER_NOT_FOUND_EXCEPTIONS = "setHideUserNotFoundExceptions";
private static final String LOAD_USER_BY_USERNAME = "loadUserByUsername";
private static final String BOOLEAN = "boolean";
private static final String STRING = "java.lang.String";
private static final String THROWABLE = "java.lang.Throwable";
private final Deque stack = new ArrayDeque<>();
private static final MethodMatchers SET_HIDE_USER_MATCHER = MethodMatchers.create()
.ofSubTypes(ABSTRACT_USER_DETAILS_AUTHENTICATION_PROVIDER, SPRING_SEC_LDAP_AUTHENTICATION_PROVIDER)
.names(HIDE_USER_NOT_FOUND_EXCEPTIONS)
.addParametersMatcher(BOOLEAN)
.build();
private static final MethodMatchers LOAD_USER_MATCHER = MethodMatchers.create()
.ofSubTypes(USER_DETAILS_SERVICE)
.names(LOAD_USER_BY_USERNAME)
.addParametersMatcher(STRING)
.build();
@Override
public void setContext(JavaFileScannerContext context) {
super.setContext(context);
stack.clear();
}
@Override
public List nodesToVisit() {
return Arrays.asList(Tree.Kind.METHOD_INVOCATION, Tree.Kind.THROW_STATEMENT, Tree.Kind.METHOD);
}
@Override
public void visitNode(Tree tree) {
if (tree.is(Tree.Kind.METHOD)) {
stack.push(((MethodTree) tree));
return;
}
if (tree.is(Tree.Kind.THROW_STATEMENT)) {
ThrowStatementTree throwStatementTree = (ThrowStatementTree) tree;
if (throwStatementTree.expression().symbolType().is(USERNAME_NOT_FOUND_EXCEPTION) && !isInsideLoadUserByUserName()) {
reportIssue(throwStatementTree.expression(), MESSAGE);
}
return;
}
MethodInvocationTree methodInvocationTree = (MethodInvocationTree) tree;
Arguments arguments = methodInvocationTree.arguments();
if (arguments.isEmpty()) {
return;
}
ExpressionTree firstArgument = arguments.get(0);
checkHiddenUserNotFoundException(methodInvocationTree, firstArgument);
checkLoadUserArgUsedInExceptions(methodInvocationTree, firstArgument);
}
@Override
public void leaveNode(Tree tree) {
if (tree.is(Tree.Kind.METHOD)) {
stack.pop();
}
}
private void checkLoadUserArgUsedInExceptions(MethodInvocationTree methodInvocationTree, ExpressionTree expression) {
if (LOAD_USER_MATCHER.matches(methodInvocationTree) && expression.is(Tree.Kind.IDENTIFIER)) {
IdentifierTree identifierTree = (IdentifierTree) expression;
identifierTree.symbol().usages()
.stream().filter(UserEnumerationCheck::checkParentIsThrowable)
.forEach(value -> reportIssue(value, MESSAGE));
}
}
private void checkHiddenUserNotFoundException(MethodInvocationTree methodInvocationTree, ExpressionTree expression) {
if (SET_HIDE_USER_MATCHER.matches(methodInvocationTree) && !expression.asConstant(Boolean.class).orElse(true)) {
reportIssue(methodInvocationTree, MESSAGE);
}
}
private static boolean checkParentIsThrowable(Tree tree) {
Tree current = tree.parent();
while (current instanceof ExpressionTree || current instanceof Arguments) {
if (current.is(Tree.Kind.NEW_CLASS) && ((NewClassTree) current).symbolType().isSubtypeOf(THROWABLE)) {
return true;
}
current = current.parent();
}
return false;
}
private boolean isInsideLoadUserByUserName() {
return LOAD_USER_MATCHER.matches(stack.peekFirst());
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy