From 5429b85b9f6c2e640074176f36ff05fd5e4d1916 Mon Sep 17 00:00:00 2001 From: James Cammarata Date: Tue, 24 Jun 2014 09:56:33 -0500 Subject: [PATCH] Change safe_eval to a strict white list --- lib/ansible/constants.py | 17 ++++++++++------- lib/ansible/utils/__init__.py | 26 ++++++++++++++++++-------- 2 files changed, 28 insertions(+), 15 deletions(-) diff --git a/lib/ansible/constants.py b/lib/ansible/constants.py index e47d9043d6e..c2364f80ab2 100644 --- a/lib/ansible/constants.py +++ b/lib/ansible/constants.py @@ -31,7 +31,7 @@ def mk_boolean(value): else: return False -def get_config(p, section, key, env_var, default, boolean=False, integer=False, floating=False): +def get_config(p, section, key, env_var, default, boolean=False, integer=False, floating=False, islist=False): ''' return a configuration variable with casting ''' value = _get_config(p, section, key, env_var, default) if boolean: @@ -40,6 +40,8 @@ def get_config(p, section, key, env_var, default, boolean=False, integer=False, return int(value) if value and floating: return float(value) + if value and islist: + return [x.strip() for x in value.split(',')] return value def _get_config(p, section, key, env_var, default): @@ -129,12 +131,12 @@ DEFAULT_SUDO_FLAGS = get_config(p, DEFAULTS, 'sudo_flags', 'ANSIBLE_SUDO_ DEFAULT_HASH_BEHAVIOUR = get_config(p, DEFAULTS, 'hash_behaviour', 'ANSIBLE_HASH_BEHAVIOUR', 'replace') DEFAULT_JINJA2_EXTENSIONS = get_config(p, DEFAULTS, 'jinja2_extensions', 'ANSIBLE_JINJA2_EXTENSIONS', None) DEFAULT_EXECUTABLE = get_config(p, DEFAULTS, 'executable', 'ANSIBLE_EXECUTABLE', '/bin/sh') -DEFAULT_SU_EXE = get_config(p, DEFAULTS, 'su_exe', 'ANSIBLE_SU_EXE', 'su') -DEFAULT_SU = get_config(p, DEFAULTS, 'su', 'ANSIBLE_SU', False, boolean=True) -DEFAULT_SU_FLAGS = get_config(p, DEFAULTS, 'su_flags', 'ANSIBLE_SU_FLAGS', '') -DEFAULT_SU_USER = get_config(p, DEFAULTS, 'su_user', 'ANSIBLE_SU_USER', 'root') -DEFAULT_ASK_SU_PASS = get_config(p, DEFAULTS, 'ask_su_pass', 'ANSIBLE_ASK_SU_PASS', False, boolean=True) -DEFAULT_GATHERING = get_config(p, DEFAULTS, 'gathering', 'ANSIBLE_GATHERING', 'implicit').lower() +DEFAULT_SU_EXE = get_config(p, DEFAULTS, 'su_exe', 'ANSIBLE_SU_EXE', 'su') +DEFAULT_SU = get_config(p, DEFAULTS, 'su', 'ANSIBLE_SU', False, boolean=True) +DEFAULT_SU_FLAGS = get_config(p, DEFAULTS, 'su_flags', 'ANSIBLE_SU_FLAGS', '') +DEFAULT_SU_USER = get_config(p, DEFAULTS, 'su_user', 'ANSIBLE_SU_USER', 'root') +DEFAULT_ASK_SU_PASS = get_config(p, DEFAULTS, 'ask_su_pass', 'ANSIBLE_ASK_SU_PASS', False, boolean=True) +DEFAULT_GATHERING = get_config(p, DEFAULTS, 'gathering', 'ANSIBLE_GATHERING', 'implicit').lower() DEFAULT_ACTION_PLUGIN_PATH = get_config(p, DEFAULTS, 'action_plugins', 'ANSIBLE_ACTION_PLUGINS', '/usr/share/ansible_plugins/action_plugins') DEFAULT_CALLBACK_PLUGIN_PATH = get_config(p, DEFAULTS, 'callback_plugins', 'ANSIBLE_CALLBACK_PLUGINS', '/usr/share/ansible_plugins/callback_plugins') @@ -152,6 +154,7 @@ DEFAULT_UNDEFINED_VAR_BEHAVIOR = get_config(p, DEFAULTS, 'error_on_undefined_var HOST_KEY_CHECKING = get_config(p, DEFAULTS, 'host_key_checking', 'ANSIBLE_HOST_KEY_CHECKING', True, boolean=True) SYSTEM_WARNINGS = get_config(p, DEFAULTS, 'system_warnings', 'ANSIBLE_SYSTEM_WARNINGS', True, boolean=True) DEPRECATION_WARNINGS = get_config(p, DEFAULTS, 'deprecation_warnings', 'ANSIBLE_DEPRECATION_WARNINGS', True, boolean=True) +DEFAULT_CALLABLE_WHITELIST = get_config(p, DEFAULTS, 'callable_whitelist', 'ANSIBLE_CALLABLE_WHITELIST', [], islist=True) # CONNECTION RELATED ANSIBLE_SSH_ARGS = get_config(p, 'ssh_connection', 'ssh_args', 'ANSIBLE_SSH_ARGS', None) diff --git a/lib/ansible/utils/__init__.py b/lib/ansible/utils/__init__.py index e3ad20ad897..89b8fc75dc7 100644 --- a/lib/ansible/utils/__init__.py +++ b/lib/ansible/utils/__init__.py @@ -1065,21 +1065,31 @@ def safe_eval(expr, locals={}, include_exceptions=False): ) ) - # builtin functions that are not safe to call - INVALID_CALLS = ( - 'classmethod', 'compile', 'delattr', 'eval', 'execfile', 'file', - 'filter', 'help', 'input', 'object', 'open', 'raw_input', 'reduce', - 'reload', 'repr', 'setattr', 'staticmethod', 'super', 'type', - ) + # builtin functions that are safe to call + BUILTIN_WHITELIST = [ + 'abs', 'all', 'any', 'basestring', 'bin', 'bool', 'buffer', 'bytearray', + 'bytes', 'callable', 'chr', 'cmp', 'coerce', 'complex', 'copyright', 'credits', + 'dict', 'dir', 'divmod', 'enumerate', 'exit', 'float', 'format', 'frozenset', + 'getattr', 'globals', 'hasattr', 'hash', 'hex', 'id', 'int', 'intern', + 'isinstance', 'issubclass', 'iter', 'len', 'license', 'list', 'locals', 'long', + 'map', 'max', 'memoryview', 'min', 'next', 'oct', 'ord', 'pow', 'print', + 'property', 'quit', 'range', 'reversed', 'round', 'set', 'slice', 'sorted', + 'str', 'sum', 'tuple', 'unichr', 'unicode', 'vars', 'xrange', 'zip', + ] + + filter_list = [] + for filter in filter_loader.all(): + filter_list.extend(filter.filters().keys()) + + CALL_WHITELIST = BUILTIN_WHITELIST + filter_list + C.DEFAULT_CALLABLE_WHITELIST class CleansingNodeVisitor(ast.NodeVisitor): def generic_visit(self, node): if type(node) not in SAFE_NODES: - #raise Exception("invalid expression (%s) type=%s" % (expr, type(node))) raise Exception("invalid expression (%s)" % expr) super(CleansingNodeVisitor, self).generic_visit(node) def visit_Call(self, call): - if call.func.id in INVALID_CALLS: + if call.func.id not in CALL_WHITELIST: raise Exception("invalid function: %s" % call.func.id) if not isinstance(expr, basestring):