X-Git-Url: https://git.auder.net/?a=blobdiff_plain;f=server%2Froutes%2Fusers.js;h=0302b1c05c96f1a8def94851748445eaeed20d0a;hb=a749972cf93fd021dda11389753ae4985ff61b42;hp=ab139eb612705a663f721fb22b410285359e9f50;hpb=fe4c7e67075416c48aafe9e307bef5afea7937bc;p=vchess.git diff --git a/server/routes/users.js b/server/routes/users.js index ab139eb6..0302b1c0 100644 --- a/server/routes/users.js +++ b/server/routes/users.js @@ -20,6 +20,8 @@ router.get("/whoami", access.ajax, (req,res) => { const anonymous = {name:"", email:"", id:0, notify:false}; if (!req.cookies.token) return callback(anonymous); + if (!req.cookies.token.match(/^[a-z0-9]+$/)) + return res.json({errmsg: "Bad token"}); UserModel.getOne("sessionToken", req.cookies.token, function(err, user) { if (!!err || !user) callback(anonymous); @@ -31,6 +33,8 @@ router.get("/whoami", access.ajax, (req,res) => { // NOTE: this method is safe because only IDs and names are returned router.get("/users", access.ajax, (req,res) => { const ids = req.query["ids"]; + if (!!ids && !ids.match(/^([0-9]+,?)+$/)) //NOTE: slightly too permissive + return res.json({errmsg: "Bad IDs array"}); UserModel.getByIds(ids, (err,users) => { if (!!err) return res.json({errmsg: err.toString()}); @@ -47,9 +51,11 @@ function setAndSendLoginToken(subject, to, res) if (!!err) return res.json({errmsg: err.toString()}); const body = - "Hello " + to.name + "!\\n" + + "Hello " + to.name + "!" + ` +` + "Access your account here: " + - params.siteURL + "/#/authenticate/" + token + "\\n" + + params.siteURL + "/#/authenticate/" + token + ` +` + "Token will expire in " + params.token.expire/(1000*60) + " minutes." sendEmail(params.mail.noreply, to.email, subject, body, err => { res.json(err || {}); @@ -90,6 +96,8 @@ router.get('/sendtoken', access.unlogged, access.ajax, (req,res) => { }); router.get('/authenticate', access.unlogged, access.ajax, (req,res) => { + if (!req.query.token.match(/^[a-z0-9]+$/)) + return res.json({errmsg: "Bad token"}); UserModel.getOne("loginToken", req.query.token, (err,user) => { access.checkRequest(res, err, user, "Invalid token", () => { // If token older than params.tokenExpire, do nothing