From eac1c3b651cb82f505035109a7b55bb37119c107 Mon Sep 17 00:00:00 2001 From: Tim Nolte Date: Thu, 8 Apr 2021 22:10:34 -0400 Subject: [PATCH 1/2] Release/3.8.3 (#290) * Feature/travis ci to GitHub actions (#282) * Updates Composer/NPM Dependencies & Adds New GitHub Actions * Moves All CI/CI Functionality to GitHub Actions - Updates Composer & NPM dependencies to newer versions. - Updates default development environment WordPress version to 5.6.x. - Fixes missing updated to the language POT file. - Moves to using a GitHub Release for WordPress.org deployment. - Removes TravisCI configuration. * Fixes Login Page XSS Issue (#283) - Adds escaping to the errot output message. - Adds escaping to the login button output. * Fixes Broken Redirect URL Handling & Moves Away from Cookies (#289) * Initial Changes to Move Away from Cookies for Redirects * Add Redirection via State Transient Support - Adds adding the login redirection to the state transient. - Deprecates the use of cookies to handle login redirection. - Fixes Login button shortcode authentication URL encoding. - Fixes some broken wp-env local Docker environment issues. - Fixes make_authentication_url attributes usage. - Removes error_log calls used for debugging. * Fixes Missed WordPress Coding Standards Issues - Updates PHP_CodeSniffer configuration to properly support all checks. * Fixes Login Button Output for Proper Escaping * Preparation for Maintenance Release --- .wp-env.json | 26 +- CHANGELOG.md | 6 + README.md | 8 +- css/styles-admin.css | 32 + .../openid-connect-generic-client-wrapper.php | 71 +- includes/openid-connect-generic-client.php | 88 +- .../openid-connect-generic-login-form.php | 114 +- .../openid-connect-generic-option-logger.php | 33 +- ...openid-connect-generic-option-settings.php | 16 +- .../openid-connect-generic-settings-page.php | 35 +- languages/openid-connect-generic.pot | 166 +- openid-connect-generic.php | 28 +- package-lock.json | 5519 ++++++++--------- package.json | 11 +- phpcs.xml.dist | 104 +- phpstan.neon.dist | 2 + readme.txt | 8 +- tools/local-env/phpunit-wp-config.php | 133 + tools/local-env/wp-config.dev.php | 140 + tools/local-env/wp-config.tests.php | 247 + 20 files changed, 3686 insertions(+), 3101 deletions(-) create mode 100644 css/styles-admin.css create mode 100644 tools/local-env/phpunit-wp-config.php create mode 100644 tools/local-env/wp-config.dev.php create mode 100644 tools/local-env/wp-config.tests.php diff --git a/.wp-env.json b/.wp-env.json index 3866196..378cd29 100644 --- a/.wp-env.json +++ b/.wp-env.json @@ -1,9 +1,33 @@ { "core": "./wordpress/build", - "plugins": [ "." ], + "plugins": [ + "." + ], "mappings": { "wp-content/mu-plugins": "./tools/local-env/mu-plugins" }, + "env": { + "development": { + "plugins": [ + ".", + "https://downloads.wordpress.org/plugin/debug-bar.zip", + "https://downloads.wordpress.org/plugin/query-monitor.zip", + "https://downloads.wordpress.org/plugin/debug-bar-post-meta.zip", + "https://downloads.wordpress.org/plugin/transients-manager.zip" + ], + "mappings": { + "wp-config.php": "tools/local-env/wp-config.dev.php" + } + }, + "tests": { + "plugins": [ + "." + ], + "mappings": { + "wp-config.php": "tools/local-env/wp-config.tests.php" + } + } + }, "config": { "PHP_INI_MEMORY_LIMIT": "512M", "WP_MEMORY_LIMIT": "512M", diff --git a/CHANGELOG.md b/CHANGELOG.md index 57f42df..7d13f39 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,11 @@ # OpenId Connect Generic Changelog +3.8.3 + +* Fix: @timnolte - Fixed problems with proper redirect handling. +* Improvement: @timnolte - Changes redirect handling to use State instead of cookies. +* Improvement: @timnolte - Refactored additional code to meet coding standards. + 3.8.2 * Fix: @timnolte - Fixed reported XSS vulnerability on WordPress login screen. diff --git a/README.md b/README.md index 5263396..d9bfb04 100644 --- a/README.md +++ b/README.md @@ -4,7 +4,7 @@ **Tags:** security, login, oauth2, openidconnect, apps, authentication, autologin, sso **Requires at least:** 4.9 **Tested up to:** 5.6 -**Stable tag:** 3.8.2 +**Stable tag:** 3.8.3 **Requires PHP:** 7.1 **License:** GPLv2 or later **License URI:** http://www.gnu.org/licenses/gpl-2.0.html @@ -51,6 +51,12 @@ On the settings page for this plugin (Dashboard > Settings > OpenID Connect Gene ## Changelog ## +### 3.8.3 ### + +* Fix: @timnolte - Fixed problems with proper redirect handling. +* Improvement: @timnolte - Changes redirect handling to use State instead of cookies. +* Improvement: @timnolte - Refactored additional code to meet coding standards. + ### 3.8.2 ### * Fix: @timnolte - Fixed reported XSS vulnerability on WordPress login screen. diff --git a/css/styles-admin.css b/css/styles-admin.css new file mode 100644 index 0000000..cc4c6f9 --- /dev/null +++ b/css/styles-admin.css @@ -0,0 +1,32 @@ +#logger-table .col-data { + width: 85% +} + +#logger-table .col-data pre { + margin: 0; + white-space: pre; /* CSS 2.0 */ + white-space: pre-wrap; /* CSS 2.1 */ + white-space: pre-line; /* CSS 3.0 */ + white-space: -pre-wrap; /* Opera 4-6 */ + white-space: -o-pre-wrap; /* Opera 7 */ + white-space: -moz-pre-wrap; /* Mozilla */ + white-space: -hp-pre-wrap; /* HP Printers */ + word-wrap: break-word; /* IE 5+ */ +} + +#logger-table .col-details { + width: 200px; +} + +#logger-table .col-details div { + padding: 4px 0; + border-bottom: 1px solid #bbb; +} + +#logger-table .col-details div:last-child { + border-bottom: none; +} + +#logger-table .col-details label { + font-weight: bold; +} diff --git a/includes/openid-connect-generic-client-wrapper.php b/includes/openid-connect-generic-client-wrapper.php index 737c575..2678b32 100644 --- a/includes/openid-connect-generic-client-wrapper.php +++ b/includes/openid-connect-generic-client-wrapper.php @@ -9,6 +9,8 @@ * @license http://www.gnu.org/licenses/gpl-2.0.txt GPL-2.0+ */ +use \WP_Error as WP_Error; + /** * OpenID_Connect_Generic_Client_Wrapper class. * @@ -50,6 +52,8 @@ class OpenID_Connect_Generic_Client_Wrapper { /** * The user redirect cookie key. * + * @deprecated Redirection should be done via state transient and not cookies. + * * @var string */ public $cookie_redirect_key = 'openid-connect-generic-redirect'; @@ -70,7 +74,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * @param OpenID_Connect_Generic_Option_Settings $settings A plugin settings object instance. * @param OpenID_Connect_Generic_Option_Logger $logger A plugin logger object instance. */ - function __construct( OpenID_Connect_Generic_Client $client, OpenID_Connect_Generic_Option_Settings $settings, OpenID_Connect_Generic_Option_Logger $logger ) { + public function __construct( OpenID_Connect_Generic_Client $client, OpenID_Connect_Generic_Option_Settings $settings, OpenID_Connect_Generic_Option_Logger $logger ) { $this->client = $client; $this->settings = $settings; $this->logger = $logger; @@ -85,7 +89,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * * @return \OpenID_Connect_Generic_Client_Wrapper */ - static public function register( OpenID_Connect_Generic_Client $client, OpenID_Connect_Generic_Option_Settings $settings, OpenID_Connect_Generic_Option_Logger $logger ) { + public static function register( OpenID_Connect_Generic_Client $client, OpenID_Connect_Generic_Option_Settings $settings, OpenID_Connect_Generic_Option_Logger $logger ) { $client_wrapper = new self( $client, $settings, $logger ); // Integrated logout. @@ -128,7 +132,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * * @return mixed */ - function alternate_redirect_uri_parse_request( $query ) { + public function alternate_redirect_uri_parse_request( $query ) { if ( isset( $query->query_vars['openid-connect-authorize'] ) && '1' === $query->query_vars['openid-connect-authorize'] ) { $this->authentication_request_callback(); @@ -145,14 +149,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * * @return string */ - function get_authentication_url( $atts = array() ) { - - if ( ! empty( $atts['redirect_to'] ) ) { - // Set the request query parameter used to set the cookie redirect. - $_REQUEST['redirect_to'] = $atts['redirect_to']; - $login_form = new OpenID_Connect_Generic_Login_Form( $this->settings, $this ); - $login_form->handle_redirect_cookie(); - } + public function get_authentication_url( $atts = array() ) { return $this->client->make_authentication_url( $atts ); @@ -163,7 +160,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * * @return void */ - function ensure_tokens_still_fresh() { + public function ensure_tokens_still_fresh() { if ( ! is_user_logged_in() ) { return; } @@ -225,7 +222,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * * @return void */ - function error_redirect( $error ) { + public function error_redirect( $error ) { $this->logger->log( $error ); // Redirect user back to login page. @@ -242,7 +239,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * * @return bool|WP_Error */ - function get_error() { + public function get_error() { return $this->error; } @@ -253,7 +250,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * * @return array|bool */ - function update_allowed_redirect_hosts( $allowed ) { + public function update_allowed_redirect_hosts( $allowed ) { $host = parse_url( $this->settings->endpoint_end_session, PHP_URL_HOST ); if ( ! $host ) { return false; @@ -272,7 +269,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * * @return string */ - function get_end_session_logout_redirect_url( $redirect_url, $requested_redirect_to, $user ) { + public function get_end_session_logout_redirect_url( $redirect_url, $requested_redirect_to, $user ) { $url = $this->settings->endpoint_end_session; $query = parse_url( $url, PHP_URL_QUERY ); $url .= $query ? '&' : '?'; @@ -317,7 +314,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * * @return mixed */ - function alter_request( $request, $operation ) { + public function alter_request( $request, $operation ) { if ( ! empty( $this->settings->http_request_timeout ) && is_numeric( $this->settings->http_request_timeout ) ) { $request['timeout'] = intval( $this->settings->http_request_timeout ); } @@ -335,7 +332,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * * @return void */ - function authentication_request_callback() { + public function authentication_request_callback() { $client = $this->client; // Start the authentication flow. @@ -352,6 +349,13 @@ class OpenID_Connect_Generic_Client_Wrapper { $this->error_redirect( $code ); } + // Retrieve the authentication state from the authentication request. + $state = $client->get_authentication_state( $authentication_request ); + + if ( is_wp_error( $state ) ) { + $this->error_redirect( $state ); + } + // Attempting to exchange an authorization code for an authentication token. $token_result = $client->request_authentication_token( $code ); @@ -452,12 +456,22 @@ class OpenID_Connect_Generic_Client_Wrapper { // Log our success. $this->logger->log( "Successful login for: {$user->user_login} ({$user->ID})", 'login-success' ); - // Redirect back to the origin page if enabled. - $redirect_url = isset( $_COOKIE[ $this->cookie_redirect_key ] ) ? esc_url_raw( $_COOKIE[ $this->cookie_redirect_key ] ) : false; + // Default redirect to the homepage. + $redirect_url = home_url(); + // Redirect user according to redirect set in state. + $state_object = get_transient( 'openid-connect-generic-state--' . $state ); + // Get the redirect URL stored with the corresponding authentication request state. + if ( ! empty( $state_object ) ) { + $redirect_url = $state_object['redirect_to']; + } + + // Provide backwards compatibility for customization using the deprecated cookie method. + if ( ! empty( $_COOKIE[ $this->cookie_redirect_key ] ) ) { + $redirect_url = esc_url_raw( wp_unslash( $_COOKIE[ $this->cookie_redirect_key ] ) ); + } if ( $this->settings->redirect_user_back && ! empty( $redirect_url ) ) { do_action( 'openid-connect-generic-redirect-user-back', $redirect_url, $user ); - setcookie( $this->cookie_redirect_key, $redirect_url, 1, COOKIEPATH, COOKIE_DOMAIN, is_ssl() ); wp_redirect( $redirect_url ); } else { // Otherwise, go home! wp_redirect( home_url() ); @@ -473,7 +487,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * * @return true|WP_Error */ - function validate_user( $user ) { + public function validate_user( $user ) { // Ensure the found user is a real WP_User. if ( ! is_a( $user, 'WP_User' ) || ! $user->exists() ) { return new WP_Error( 'invalid-user', __( 'Invalid user.', 'daggerhart-openid-connect-generic' ), $user ); @@ -493,7 +507,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * * @return void */ - function login_user( $user, $token_response, $id_token_claim, $user_claim, $subject_identity ) { + public function login_user( $user, $token_response, $id_token_claim, $user_claim, $subject_identity ) { // Store the tokens for future reference. update_user_meta( $user->ID, 'openid-connect-generic-last-token-response', $token_response ); update_user_meta( $user->ID, 'openid-connect-generic-last-id-token-claim', $id_token_claim ); @@ -519,7 +533,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * @param string $token The current users session token. * @param array|WP_Error|null $token_response The authentication token response. */ - function save_refresh_token( $manager, $token, $token_response ) { + public function save_refresh_token( $manager, $token, $token_response ) { if ( ! $this->settings->token_refresh_enable ) { return; } @@ -549,7 +563,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * * @return false|WP_User */ - function get_user_by_identity( $subject_identity ) { + public function get_user_by_identity( $subject_identity ) { // Look for user by their openid-connect-generic-subject-identity value. $user_query = new WP_User_Query( array( @@ -602,10 +616,12 @@ class OpenID_Connect_Generic_Client_Wrapper { // @var string $transliterated_username The username converted to ASCII from UTF-8. $transliterated_username = iconv( 'UTF-8', 'ASCII//TRANSLIT', $desired_username ); if ( empty( $transliterated_username ) ) { + // translators: $1$s is a username from the IDP. return new WP_Error( 'username-transliteration-failed', sprintf( __( 'Username %1$s could not be transliterated.', 'daggerhart-openid-connect-generic' ), $desired_username ), $desired_username ); } $normalized_username = strtolower( preg_replace( '/[^a-zA-Z0-9 _.\-@]/', '', $transliterated_username ) ); if ( empty( $normalized_username ) ) { + // translators: %1$s is the ASCII version of the username from the IDP. return new WP_Error( 'username-normalization-failed', sprintf( __( 'Username %1$s could not be normalized.', 'daggerhart-openid-connect-generic' ), $transliterated_username ), $transliterated_username ); } @@ -639,6 +655,7 @@ class OpenID_Connect_Generic_Client_Wrapper { } if ( empty( $desired_nickname ) ) { + // translators: %1$s is the configured User Claim nickname key. return new WP_Error( 'no-nickname', sprintf( __( 'No nickname found in user claim using key: %1$s.', 'daggerhart-openid-connect-generic' ), $this->settings->nickname_key ), $this->settings->nickname_key ); } @@ -723,7 +740,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * * @return \WP_Error | \WP_User */ - function create_new_user( $subject_identity, $user_claim ) { + public function create_new_user( $subject_identity, $user_claim ) { $user_claim = apply_filters( 'openid-connect-generic-alter-user-claim', $user_claim ); // Default username & email to the subject identity. @@ -868,7 +885,7 @@ class OpenID_Connect_Generic_Client_Wrapper { * * @return WP_Error|WP_User */ - function update_existing_user( $uid, $subject_identity ) { + public function update_existing_user( $uid, $subject_identity ) { // Add the OpenID Connect meta data. update_user_meta( $uid, 'openid-connect-generic-subject-identity', strval( $subject_identity ) ); diff --git a/includes/openid-connect-generic-client.php b/includes/openid-connect-generic-client.php index 11eceac..a2feb75 100644 --- a/includes/openid-connect-generic-client.php +++ b/includes/openid-connect-generic-client.php @@ -111,7 +111,7 @@ class OpenID_Connect_Generic_Client { * @param int $state_time_limit @see OpenID_Connect_Generic_Option_Settings::state_time_limit for description. * @param OpenID_Connect_Generic_Option_Logger $logger The plugin logging object instance. */ - function __construct( $client_id, $client_secret, $scope, $endpoint_login, $endpoint_userinfo, $endpoint_token, $redirect_uri, $state_time_limit, $logger ) { + public function __construct( $client_id, $client_secret, $scope, $endpoint_login, $endpoint_userinfo, $endpoint_token, $redirect_uri, $state_time_limit, $logger ) { $this->client_id = $client_id; $this->client_secret = $client_secret; $this->scope = $scope; @@ -130,12 +130,24 @@ class OpenID_Connect_Generic_Client { * * @return string */ - function make_authentication_url( $atts = array() ) { + public function make_authentication_url( $atts = array() ) { + + $atts = shortcode_atts( + array( + 'endpoint_login' => $this->endpoint_login, + 'scope' => $this->scope, + 'client_id' => $this->client_id, + 'redirect_uri' => $this->redirect_uri, + 'redirect_to' => home_url(), // Default redirect to the homepage. + ), + $atts, + 'openid_connect_generic_auth_url' + ); - $endpoint_login = ( ! empty( $atts['endpoint_login'] ) ) ? $atts['endpoint_login'] : $this->endpoint_login; - $scope = ( ! empty( $atts['scope'] ) ) ? $atts['scope'] : $this->scope; - $client_id = ( ! empty( $atts['client_id'] ) ) ? $atts['client_id'] : $this->client_id; - $redirect_uri = ( ! empty( $atts['redirect_uri'] ) ) ? $atts['redirect_uri'] : $this->redirect_uri; + // Validate the redirect to value to prevent a redirection attack. + if ( ! empty( $atts['redirect_to'] ) ) { + $atts['redirect_to'] = wp_validate_redirect( $atts['redirect_to'], home_url() ); + } $separator = '?'; if ( stripos( $this->endpoint_login, '?' ) !== false ) { @@ -143,12 +155,12 @@ class OpenID_Connect_Generic_Client { } $url = sprintf( '%1$s%2$sresponse_type=code&scope=%3$s&client_id=%4$s&state=%5$s&redirect_uri=%6$s', - $endpoint_login, + $atts['endpoint_login'], $separator, - rawurlencode( $scope ), - rawurlencode( $client_id ), - $this->new_state(), - rawurlencode( $redirect_uri ) + rawurlencode( $atts['scope'] ), + rawurlencode( $atts['client_id'] ), + $this->new_state( $atts['redirect_to'] ), + rawurlencode( $atts['redirect_uri'] ) ); $this->logger->log( apply_filters( 'openid-connect-generic-auth-url', $url ), 'make_authentication_url' ); @@ -162,7 +174,7 @@ class OpenID_Connect_Generic_Client { * * @return array|WP_Error */ - function validate_authentication_request( $request ) { + public function validate_authentication_request( $request ) { // Look for an existing error of some kind. if ( isset( $request['error'] ) ) { return new WP_Error( 'unknown-error', 'An unknown error occurred.', $request ); @@ -193,7 +205,7 @@ class OpenID_Connect_Generic_Client { * * @return string|WP_Error */ - function get_authentication_code( $request ) { + public function get_authentication_code( $request ) { if ( ! isset( $request['code'] ) ) { return new WP_Error( 'missing-authentication-code', __( 'Missing authentication code.', 'daggerhart-openid-connect-generic' ), $request ); } @@ -208,7 +220,7 @@ class OpenID_Connect_Generic_Client { * * @return array|WP_Error */ - function request_authentication_token( $code ) { + public function request_authentication_token( $code ) { // Add Host header - required for when the openid-connect endpoint is behind a reverse-proxy. $parsed_url = parse_url( $this->endpoint_token ); @@ -247,7 +259,7 @@ class OpenID_Connect_Generic_Client { * * @return array|WP_Error */ - function request_new_tokens( $refresh_token ) { + public function request_new_tokens( $refresh_token ) { $request = array( 'body' => array( 'refresh_token' => $refresh_token, @@ -278,7 +290,7 @@ class OpenID_Connect_Generic_Client { * * @return array|WP_Error|null */ - function get_token_response( $token_result ) { + public function get_token_response( $token_result ) { if ( ! isset( $token_result['body'] ) ) { return new WP_Error( 'missing-token-body', __( 'Missing token body.', 'daggerhart-openid-connect-generic' ), $token_result ); } @@ -310,7 +322,7 @@ class OpenID_Connect_Generic_Client { * * @return array|WP_Error */ - function request_userinfo( $access_token ) { + public function request_userinfo( $access_token ) { // Allow modifications to the request. $request = apply_filters( 'openid-connect-generic-alter-request', array(), 'get-userinfo' ); @@ -348,12 +360,19 @@ class OpenID_Connect_Generic_Client { /** * Generate a new state, save it as a transient, and return the state hash. * + * @param string $redirect_to The redirect URL to be used after IDP authentication. + * * @return string */ - function new_state() { + public function new_state( $redirect_to ) { // New state w/ timestamp. $state = md5( mt_rand() . microtime( true ) ); - set_transient( 'openid-connect-generic-state--' . $state, $state, $this->state_time_limit ); + $state_value = array( + $state => array( + 'redirect_to' => $redirect_to, + ), + ); + set_transient( 'openid-connect-generic-state--' . $state, $state_value, $this->state_time_limit ); return $state; } @@ -365,7 +384,7 @@ class OpenID_Connect_Generic_Client { * * @return bool */ - function check_state( $state ) { + public function check_state( $state ) { $state_found = true; @@ -380,7 +399,22 @@ class OpenID_Connect_Generic_Client { do_action( 'openid-connect-generic-state-expired', $state ); } - return ! ! $valid; + return boolval( $valid ); + } + + /** + * Get the authorization state from the request + * + * @param array|WP_Error $request The authentication request results. + * + * @return string|WP_Error + */ + public function get_authentication_state( $request ) { + if ( ! isset( $request['state'] ) ) { + return new WP_Error( 'missing-authentication-state', __( 'Missing authentication state.', 'daggerhart-openid-connect-generic' ), $request ); + } + + return $request['state']; } /** @@ -390,7 +424,7 @@ class OpenID_Connect_Generic_Client { * * @return bool|WP_Error */ - function validate_token_response( $token_response ) { + public function validate_token_response( $token_response ) { /* * Ensure 2 specific items exist with the token response in order * to proceed with confidence: id_token and token_type == 'Bearer' @@ -411,7 +445,7 @@ class OpenID_Connect_Generic_Client { * * @return array|WP_Error */ - function get_id_token_claim( $token_response ) { + public function get_id_token_claim( $token_response ) { // Validate there is an id_token. if ( ! isset( $token_response['id_token'] ) ) { return new WP_Error( 'no-identity-token', __( 'No identity token.', 'daggerhart-openid-connect-generic' ), $token_response ); @@ -446,7 +480,7 @@ class OpenID_Connect_Generic_Client { * * @return bool|WP_Error */ - function validate_id_token_claim( $id_token_claim ) { + public function validate_id_token_claim( $id_token_claim ) { if ( ! is_array( $id_token_claim ) ) { return new WP_Error( 'bad-id-token-claim', __( 'Bad ID token claim.', 'daggerhart-openid-connect-generic' ), $id_token_claim ); } @@ -466,7 +500,7 @@ class OpenID_Connect_Generic_Client { * * @return array|WP_Error|null */ - function get_user_claim( $token_response ) { + public function get_user_claim( $token_response ) { // Send a userinfo request to get user claim. $user_claim_result = $this->request_userinfo( $token_response['access_token'] ); @@ -489,7 +523,7 @@ class OpenID_Connect_Generic_Client { * * @return bool|WP_Error */ - function validate_user_claim( $user_claim, $id_token_claim ) { + public function validate_user_claim( $user_claim, $id_token_claim ) { // Validate the user claim. if ( ! is_array( $user_claim ) ) { return new WP_Error( 'invalid-user-claim', __( 'Invalid user claim.', 'daggerhart-openid-connect-generic' ), $user_claim ); @@ -526,7 +560,7 @@ class OpenID_Connect_Generic_Client { * * @return mixed */ - function get_subject_identity( $id_token_claim ) { + public function get_subject_identity( $id_token_claim ) { return $id_token_claim['sub']; } diff --git a/includes/openid-connect-generic-login-form.php b/includes/openid-connect-generic-login-form.php index a64924d..b5af818 100644 --- a/includes/openid-connect-generic-login-form.php +++ b/includes/openid-connect-generic-login-form.php @@ -39,12 +39,9 @@ class OpenID_Connect_Generic_Login_Form { * @param OpenID_Connect_Generic_Option_Settings $settings A plugin settings object instance. * @param OpenID_Connect_Generic_Client_Wrapper $client_wrapper A plugin client wrapper object instance. */ - function __construct( $settings, $client_wrapper ) { + public function __construct( $settings, $client_wrapper ) { $this->settings = $settings; $this->client_wrapper = $client_wrapper; - - // Handle setting the redirect cookie on a formu page. - add_action( 'login_form_login', array( $this, 'handle_redirect_cookie' ) ); } /** @@ -55,7 +52,7 @@ class OpenID_Connect_Generic_Login_Form { * * @return void */ - static public function register( $settings, $client_wrapper ) { + public static function register( $settings, $client_wrapper ) { $login_form = new self( $settings, $client_wrapper ); // Alter the login form as dictated by settings. @@ -72,16 +69,20 @@ class OpenID_Connect_Generic_Login_Form { * * @return void */ - function handle_redirect_login_type_auto() { + public function handle_redirect_login_type_auto() { if ( 'wp-login.php' == $GLOBALS['pagenow'] && ( 'auto' == $this->settings->login_type || ! empty( $_GET['force_redirect'] ) ) // Don't send users to the IDP on logout or post password protected authentication. && ( ! isset( $_GET['action'] ) || ! in_array( $_GET['action'], array( 'logout', 'postpass' ) ) ) + // phpcs:ignore WordPress.Security.NonceVerification.Missing -- WP Login Form doesn't have a nonce. && ! isset( $_POST['wp-submit'] ) ) { if ( ! isset( $_GET['login-error'] ) ) { - $this->handle_redirect_cookie(); - wp_redirect( $this->client_wrapper->get_authentication_url() ); + $redirect_to = $this->get_redirect_to(); + if ( empty( $redirect_to ) ) { + return; + } + wp_redirect( $this->client_wrapper->get_authentication_url( array( 'redirect_to' => $redirect_to ) ) ); exit; } else { add_action( 'login_footer', array( $this, 'remove_login_form' ), 99 ); @@ -91,35 +92,45 @@ class OpenID_Connect_Generic_Login_Form { } /** - * Handle login related redirects. + * Get the client login redirect. * - * @return void + * @return string */ - function handle_redirect_cookie() { + public function get_redirect_to() { + global $wp; + if ( isset( $GLOBALS['pagenow'] ) && 'wp-login.php' == $GLOBALS['pagenow'] && isset( $_GET['action'] ) && 'logout' === $_GET['action'] ) { - return; + return ''; } - // Record the URL of this page if set to redirect back to origin page. - if ( $this->settings->redirect_user_back ) { - $redirect_expiry = current_time( 'timestamp' ) + DAY_IN_SECONDS; + // Default redirect to the homepage. + $redirect_url = home_url(); - // Default redirect to the homepage. - $redirect_url = home_url( esc_url( add_query_arg( null, null ) ) ); + // If using the login form, default redirect to the admin dashboard. + if ( isset( $GLOBALS['pagenow'] ) && 'wp-login.php' == $GLOBALS['pagenow'] ) { + $redirect_url = admin_url(); + } - if ( isset( $GLOBALS['pagenow'] ) && 'wp-login.php' == $GLOBALS['pagenow'] ) { - // If using the login form, default redirect to the admin dashboard. - $redirect_url = admin_url(); + // Honor Core WordPress & other plugin redirects. + if ( isset( $_REQUEST['redirect_to'] ) ) { + $redirect_url = esc_url_raw( wp_unslash( $_REQUEST['redirect_to'] ) ); + } - if ( isset( $_REQUEST['redirect_to'] ) ) { - $redirect_url = esc_url_raw( $_REQUEST['redirect_to'] ); - } - } + // Record the URL of the redirect_to if set to redirect back to origin page. + if ( $this->settings->redirect_user_back ) { + $redirect_url = home_url( add_query_arg( $wp->request ) ); + } - $redirect_url = apply_filters( 'openid-connect-generic-cookie-redirect-url', $redirect_url ); + // This hook is being deprecated with the move away from cookies. + $redirect_url = apply_filters_deprecated( + 'openid-connect-generic-cookie-redirect-url', + array( $redirect_url ), + '3.8.2', + 'openid-connect-generic-client-redirect-to' + ); - setcookie( $this->client_wrapper->cookie_redirect_key, $redirect_url, $redirect_expiry, COOKIEPATH, COOKIE_DOMAIN, is_ssl() ); - } + // This is the new hook to use with the transients version of redirection. + return apply_filters( 'openid-connect-generic-client-redirect-to', $redirect_url ); } /** @@ -129,11 +140,11 @@ class OpenID_Connect_Generic_Login_Form { * * @return string */ - function handle_login_page( $message ) { + public function handle_login_page( $message ) { if ( isset( $_GET['login-error'] ) ) { - $error_message = ! empty( $_GET['message'] ) ? $_GET['message'] : 'Unknown error.'; - $message .= $this->make_error_output( $_GET['login-error'], $error_message ); + $error_message = ! empty( $_GET['message'] ) ? sanitize_text_field( wp_unslash( $_GET['message'] ) ) : 'Unknown error.'; + $message .= $this->make_error_output( sanitize_text_field( wp_unslash( $_GET['login-error'] ) ), $error_message ); } // Login button is appended to existing messages in case of error. @@ -150,12 +161,12 @@ class OpenID_Connect_Generic_Login_Form { * * @return string */ - function make_error_output( $error_code, $error_message ) { + public function make_error_output( $error_code, $error_message ) { ob_start(); ?> -
- : +
+ :
__( 'Login with OpenID Connect', 'daggerhart-openid-connect-generic' ), + 'redirect_to' => $this->get_redirect_to(), + ), + $atts, + 'openid_connect_generic_login_button' + ); + + $text = apply_filters( 'openid-connect-generic-login-button-text', $atts['button_text'] ); + $text = esc_html( $text ); - $text = apply_filters( 'openid-connect-generic-login-button-text', $button_text ); $href = $this->client_wrapper->get_authentication_url( $atts ); + $href = esc_url_raw( $href ); + + $login_button = << + {$text} +
+HTML; + + return $login_button; - ob_start(); - ?> - -