From a55dcf46b8d3ce93affed8fbeb9c6a2645157f3f Mon Sep 17 00:00:00 2001 From: "K. Adam White" Date: Mon, 9 Oct 2023 14:47:57 +0000 Subject: [PATCH] REST API: Correct parsing of password from Authorization header when processing Application Password credentials. Exit early when parsing Application Password credentials if Authorization header value does not contain at least one colon. The `Authorization` Basic header must use a colon to separate the username and password components per RFC 7617, so a username-only string is malformed and should not be processed. Split `Authorization` header only on the first colon, properly handling passwords containing colons. Resolves PHP 8.0 warning when `list()` was called on an exploded credentials array containing only one element. Props kalpeshh, shooper, sc0ttkclark, jrf, mukesh27, oglekler, nicolefurlan. Fixes #57512. git-svn-id: https://develop.svn.wordpress.org/trunk@56804 602fd350-edb4-49c9-b593-d223f7449a82 --- src/wp-includes/load.php | 7 +++++- tests/phpunit/tests/auth.php | 42 ++++++++++++++++++++++++++++++++++++ 2 files changed, 48 insertions(+), 1 deletion(-) diff --git a/src/wp-includes/load.php b/src/wp-includes/load.php index 77e17b3f8b..520902cdd6 100644 --- a/src/wp-includes/load.php +++ b/src/wp-includes/load.php @@ -126,7 +126,12 @@ function wp_populate_basic_auth_from_authorization_header() { $token = substr( $header, 6 ); $userpass = base64_decode( $token ); - list( $user, $pass ) = explode( ':', $userpass ); + // There must be at least one colon in the string. + if ( ! str_contains( $userpass, ':' ) ) { + return; + } + + list( $user, $pass ) = explode( ':', $userpass, 2 ); // Now shove them in the proper keys where we're expecting later on. $_SERVER['PHP_AUTH_USER'] = $user; diff --git a/tests/phpunit/tests/auth.php b/tests/phpunit/tests/auth.php index facd456dd0..8ab32d9f69 100644 --- a/tests/phpunit/tests/auth.php +++ b/tests/phpunit/tests/auth.php @@ -844,4 +844,46 @@ class Tests_Auth extends WP_UnitTestCase { 'not allowed' => array( 'subscriber', false ), ); } + + /* + * @ticket 57512 + * @covers ::wp_populate_basic_auth_from_authorization_header + */ + public function tests_basic_http_authentication_with_username_and_password() { + // Header passed as "username:password". + $_SERVER['HTTP_AUTHORIZATION'] = 'Basic dXNlcm5hbWU6cGFzc3dvcmQ='; + + wp_populate_basic_auth_from_authorization_header(); + + $this->assertSame( $_SERVER['PHP_AUTH_USER'], 'username' ); + $this->assertSame( $_SERVER['PHP_AUTH_PW'], 'password' ); + } + + /* + * @ticket 57512 + * @covers ::wp_populate_basic_auth_from_authorization_header + */ + public function tests_basic_http_authentication_with_username_only() { + // Malformed header passed as "username" with no password. + $_SERVER['HTTP_AUTHORIZATION'] = 'Basic dXNlcm5hbWU='; + + wp_populate_basic_auth_from_authorization_header(); + + $this->assertArrayNotHasKey( 'PHP_AUTH_USER', $_SERVER ); + $this->assertArrayNotHasKey( 'PHP_AUTH_PW', $_SERVER ); + } + + /* + * @ticket 57512 + * @covers ::wp_populate_basic_auth_from_authorization_header + */ + public function tests_basic_http_authentication_with_colon_in_password() { + // Header passed as "username:pass:word" where password contains colon. + $_SERVER['HTTP_AUTHORIZATION'] = 'Basic dXNlcm5hbWU6cGFzczp3b3Jk'; + + wp_populate_basic_auth_from_authorization_header(); + + $this->assertSame( $_SERVER['PHP_AUTH_USER'], 'username' ); + $this->assertSame( $_SERVER['PHP_AUTH_PW'], 'pass:word' ); + } }