Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion api/lib/uploader/uploader_utils.dart
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ class UploaderUtils {
paramsMap['timestamp'] =
(DateTime.now().millisecondsSinceEpoch / 1000).toString();
paramsMap['signature'] =
Utils.apiSignRequest(paramsMap, config.apiSecret!);
Utils.apiSignRequest(paramsMap, config.apiSecret!, signatureVersion: cloudinary.config.cloudConfig.signatureVersion);
paramsMap['api_key'] = config.apiKey;
if (paramsMap['unsigned'] != null) {
paramsMap.remove('unsigned');
Expand Down
39 changes: 13 additions & 26 deletions api/lib/uploader/utils.dart
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
import 'dart:convert';
import 'dart:math';
import 'package:cloudinary_url_gen/config/cloud_config.dart';
import 'package:convert/convert.dart';
import 'package:crypto/crypto.dart';

Expand All @@ -10,33 +11,19 @@ class Utils {
'filename',
];

static String apiSignRequest(
Map<String, dynamic> paramsMap, String apiSecret) {
List<String> paramsArr = <String>[];
paramsMap.removeWhere((key, value) => value == null);
paramsMap.removeWhere(
(key, value) => value == null || _excludeKeys.contains(key));
var sortedParams = paramsMap.keys.whereType<String>().toList()..sort();
for (var key in sortedParams) {
var value = paramsMap[key];
String? paramValue;
if (value is List<String>) {
if (value.isNotEmpty) {
paramValue = value.toString(); //.join(',');
} else {
continue;
}
} else {
if (value != null) {
paramValue = value.toString();
}
}
if (paramValue != null) {
paramsArr.add('$key=${paramValue.replaceAll(r'\', '')}');
static String apiSignRequest(Map<String, dynamic> paramsMap, String apiSecret, {int? signatureVersion = defaultSignatureVersion}) {
paramsMap.removeWhere((key, value) => value == null || _excludeKeys.contains(key));

String queryString = (paramsMap.keys.whereType<String>().toList()..sort())
.where((key) => paramsMap[key] is List<String> ? (paramsMap[key] as List<String>).isNotEmpty : paramsMap[key] != null)
.map((key) {
var value = paramsMap[key].toString().replaceAll(r'\', '');
if (signatureVersion == 2) {
value = value.replaceAll('&', '%26');
}
}
var toSign = '${paramsArr.join('&')}$apiSecret';
return hex.encode(sha1.convert(utf8.encode(toSign)).bytes);
return '$key=$value';
}).join('&');
return hex.encode(sha1.convert(utf8.encode(queryString + apiSecret)).bytes);
}

static bool isRemoteUrl(String value) {
Expand Down
2 changes: 1 addition & 1 deletion api/pubspec.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ dependencies:
crypto: ^3.0.3
convert: ^3.1.1
http_parser: ^4.0.2
cloudinary_url_gen: ^1.7.0
cloudinary_url_gen: ^1.8.0

dev_dependencies:
lints: ^3.0.0
Expand Down
34 changes: 34 additions & 0 deletions api/test/uploader_test.dart
Original file line number Diff line number Diff line change
Expand Up @@ -549,6 +549,40 @@ void main() {
var result = resultOrThrow(response?.data);
assert(result.playbackUrl != null);
});

test('Test signature with escaping characters', () {
const cloudName = 'dn6ot3ged';
const secret = 'hdcixPpR2iKERPwqvH6sHdK9cyac';

final paramsWithAmpersand = {
'cloud_name': cloudName,
'timestamp': 1568810420,
'notification_url': 'https://fake.com/callback?a=1&tags=hello,world'
};

final signatureWithAmpersand = Utils.apiSignRequest(paramsWithAmpersand, secret);

final paramsSmuggled = {
'cloud_name': cloudName,
'timestamp': 1568810420,
'notification_url': 'https://fake.com/callback?a=1',
'tags': 'hello,world'
};

final signatureSmuggled = Utils.apiSignRequest(paramsSmuggled, secret);

expect(signatureWithAmpersand, isNot(equals(signatureSmuggled)),
reason: 'Signatures should be different to prevent parameter smuggling');

const expectedSignature = '4fdf465dd89451cc1ed8ec5b3e314e8a51695704';
expect(signatureWithAmpersand, equals(expectedSignature));

const expectedSmuggledSignature = '7b4e3a539ff1fa6e6700c41b3a2ee77586a025f9';
expect(signatureSmuggled, equals(expectedSmuggledSignature));

final versionOneSignature = Utils.apiSignRequest(paramsSmuggled, secret, signatureVersion: 1);
expect(versionOneSignature, equals(signatureSmuggled));
});
}

validateSignature(UploadResult result) {
Expand Down
Loading