mirror of
				https://codeberg.org/forgejo/forgejo.git
				synced 2025-10-30 22:11:07 +00:00 
			
		
		
		
	fix: properly validate email containing comments
Originally reported by jomo (https://jomo.tv). A malicious actor could register with an email address containing a comment, for example "attacker@evil (comment@broken)". This commit fixes this issue by only operating on normalized email addresses. Signed-off-by: famfo <famfo@famfo.xyz>
This commit is contained in:
		
					parent
					
						
							
								9828aca733
							
						
					
				
			
			
				commit
				
					
						cf1fda81f6
					
				
			
		
					 1 changed files with 8 additions and 1 deletions
				
			
		|  | @ -80,8 +80,15 @@ func validateEmailDomain(email string) error { | |||
| } | ||||
| 
 | ||||
| func IsEmailDomainAllowed(email string) bool { | ||||
| 	// Normalized the address. This strips for example comments which could be | ||||
| 	// used to smuggle a different domain | ||||
| 	parsedAddress, err := mail.ParseAddress(email) | ||||
| 	if err != nil { | ||||
| 		return false | ||||
| 	} | ||||
| 
 | ||||
| 	return isEmailDomainAllowedInternal( | ||||
| 		email, | ||||
| 		parsedAddress.Address, | ||||
| 		setting.Service.EmailDomainAllowList, | ||||
| 		setting.Service.EmailDomainBlockList) | ||||
| } | ||||
|  |  | |||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue