Files
gt-ai-os-community/apps/tenant-backend/app/middleware/session_validation.py
HackWeasel b9dfb86260 GT AI OS Community Edition v2.0.33
Security hardening release addressing CodeQL and Dependabot alerts:

- Fix stack trace exposure in error responses
- Add SSRF protection with DNS resolution checking
- Implement proper URL hostname validation (replaces substring matching)
- Add centralized path sanitization to prevent path traversal
- Fix ReDoS vulnerability in email validation regex
- Improve HTML sanitization in validation utilities
- Fix capability wildcard matching in auth utilities
- Update glob dependency to address CVE
- Add CodeQL suppression comments for verified false positives

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2025-12-12 17:04:45 -05:00

157 lines
6.2 KiB
Python

"""
GT 2.0 Session Validation Middleware
OWASP/NIST Compliant Server-Side Session Validation (Issue #264)
- Validates session_id from JWT against server-side session state
- Updates session activity on every authenticated request
- Adds X-Session-Warning header when < 5 minutes remaining
- Returns 401 with X-Session-Expired header when session is invalid
"""
from fastapi import Request
from fastapi.responses import JSONResponse
from starlette.middleware.base import BaseHTTPMiddleware
import httpx
import logging
import jwt
from app.core.config import get_settings
settings = get_settings()
logger = logging.getLogger(__name__)
class SessionValidationMiddleware(BaseHTTPMiddleware):
"""
Middleware to validate server-side sessions on every authenticated request.
The server-side session is the authoritative source of truth for session validity.
JWT expiration is secondary - the session can expire before the JWT does.
Response Headers:
- X-Session-Warning: <seconds> - Added when session is about to expire
- X-Session-Expired: idle|absolute - Added on 401 when session expired
"""
def __init__(self, app, control_panel_url: str = None, service_auth_token: str = None):
super().__init__(app)
self.control_panel_url = control_panel_url or settings.control_panel_url or "http://control-panel-backend:8001"
self.service_auth_token = service_auth_token or settings.service_auth_token or "internal-service-token"
async def dispatch(self, request: Request, call_next):
"""Process request and validate server-side session"""
# Skip session validation for public endpoints
skip_paths = [
"/health",
"/api/v1/auth/login",
"/api/v1/auth/register",
"/api/v1/auth/refresh",
"/api/v1/auth/password-reset",
"/api/v1/public",
"/docs",
"/openapi.json",
"/redoc"
]
if any(request.url.path.startswith(path) for path in skip_paths):
return await call_next(request)
# Extract JWT from Authorization header
auth_header = request.headers.get("Authorization")
if not auth_header or not auth_header.startswith("Bearer "):
return await call_next(request)
token = auth_header.split(" ")[1]
# Decode JWT to get session_id (without verification - that's done elsewhere)
try:
# We just need to extract the session_id claim
# Full JWT verification happens in the auth dependency
payload = jwt.decode(token, options={"verify_signature": False})
session_id = payload.get("session_id")
except jwt.InvalidTokenError:
# Let the normal auth flow handle invalid tokens
return await call_next(request)
# If no session_id in JWT, skip session validation (backwards compatibility)
# This allows old tokens without session_id to work until they expire
if not session_id:
logger.debug("No session_id in JWT, skipping server-side validation")
return await call_next(request)
# Validate session with control panel
validation_result = await self._validate_session(session_id)
if validation_result is None:
# Control panel unavailable - FAIL CLOSED for security (OWASP best practice)
# Reject the request rather than allowing potentially expired sessions through
logger.error("Session validation failed - control panel unavailable, rejecting request")
return JSONResponse(
status_code=503,
content={
"detail": "Session validation service unavailable",
"code": "SESSION_VALIDATION_UNAVAILABLE"
},
headers={"X-Session-Warning": "validation-unavailable"}
)
if not validation_result.get("is_valid", False):
# Session is invalid - return 401 with expiry reason
# Ensure expiry_reason is never None (causes header encode error)
expiry_reason = validation_result.get("expiry_reason") or "unknown"
logger.info(f"Session expired: {expiry_reason}")
return JSONResponse(
status_code=401,
content={
"detail": f"Session expired ({expiry_reason})",
"code": "SESSION_EXPIRED",
"expiry_reason": expiry_reason
},
headers={"X-Session-Expired": expiry_reason}
)
# Session is valid - process request
response = await call_next(request)
# Add warning header if session is about to expire
if validation_result.get("show_warning", False):
seconds_remaining = validation_result.get("seconds_remaining", 0)
response.headers["X-Session-Warning"] = str(seconds_remaining)
logger.debug(f"Session warning: {seconds_remaining}s remaining")
return response
async def _validate_session(self, session_token: str) -> dict | None:
"""
Validate session with control panel internal API.
Returns:
dict with is_valid, expiry_reason, seconds_remaining, show_warning
or None if control panel is unavailable
"""
try:
async with httpx.AsyncClient(timeout=5.0) as client:
response = await client.post(
f"{self.control_panel_url}/internal/sessions/validate",
json={"session_token": session_token},
headers={
"X-Service-Auth": self.service_auth_token,
"X-Service-Name": "tenant-backend"
}
)
if response.status_code == 200:
return response.json()
else:
logger.error(f"Session validation failed: {response.status_code} - {response.text}")
return None
except httpx.RequestError as e:
logger.error(f"Session validation request failed: {e}")
return None
except Exception as e:
logger.error(f"Unexpected error during session validation: {e}")
return None