fix(plugin): enhanced AES encryption security (#533)

This commit is contained in:
mrh997 2025-08-04 20:03:31 +08:00 committed by GitHub
parent 36923bd0a4
commit f80d4f757b
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
8 changed files with 230 additions and 22 deletions

View File

@ -19,6 +19,7 @@ package plugin
import ( import (
"encoding/json" "encoding/json"
"net/url" "net/url"
"os"
"strings" "strings"
api "github.com/coze-dev/coze-studio/backend/api/model/plugin_develop_common" api "github.com/coze-dev/coze-studio/backend/api/model/plugin_develop_common"
@ -74,7 +75,12 @@ func (mf *PluginManifest) EncryptAuthPayload() (*PluginManifest, error) {
return mf_, nil return mf_, nil
} }
payload_, err := utils.EncryptByAES([]byte(mf_.Auth.Payload), utils.AuthSecretKey) secret := os.Getenv(utils.AuthSecretEnv)
if secret == "" {
secret = utils.DefaultAuthSecret
}
payload_, err := utils.EncryptByAES([]byte(mf_.Auth.Payload), secret)
if err != nil { if err != nil {
return nil, err return nil, err
} }
@ -357,7 +363,12 @@ func (au *AuthV2) UnmarshalJSON(data []byte) error {
} }
if auth.Payload != "" { if auth.Payload != "" {
payload_, err := utils.DecryptByAES(auth.Payload, utils.AuthSecretKey) secret := os.Getenv(utils.AuthSecretEnv)
if secret == "" {
secret = utils.DefaultAuthSecret
}
payload_, err := utils.DecryptByAES(auth.Payload, secret)
if err == nil { if err == nil {
auth.Payload = string(payload_) auth.Payload = string(payload_)
} }

View File

@ -23,6 +23,7 @@ import (
"fmt" "fmt"
"net/http" "net/http"
"net/url" "net/url"
"os"
"strconv" "strconv"
"strings" "strings"
"time" "time"
@ -1703,7 +1704,12 @@ func (p *PluginApplicationService) OauthAuthorizationCode(ctx context.Context, r
return nil, errorx.WrapByCode(err, errno.ErrPluginOAuthFailed, errorx.KV(errno.PluginMsgKey, "invalid state")) return nil, errorx.WrapByCode(err, errno.ErrPluginOAuthFailed, errorx.KV(errno.PluginMsgKey, "invalid state"))
} }
stateBytes, err := utils.DecryptByAES(stateStr, utils.StateSecretKey) secret := os.Getenv(utils.StateSecretEnv)
if secret == "" {
secret = utils.DefaultStateSecret
}
stateBytes, err := utils.DecryptByAES(stateStr, secret)
if err != nil { if err != nil {
return nil, errorx.WrapByCode(err, errno.ErrPluginOAuthFailed, errorx.KV(errno.PluginMsgKey, "invalid state")) return nil, errorx.WrapByCode(err, errno.ErrPluginOAuthFailed, errorx.KV(errno.PluginMsgKey, "invalid state"))
} }

View File

@ -21,6 +21,7 @@ import (
"encoding/json" "encoding/json"
"errors" "errors"
"fmt" "fmt"
"os"
"gorm.io/gorm" "gorm.io/gorm"
@ -42,14 +43,19 @@ func NewPluginOAuthAuthDAO(db *gorm.DB, idGen idgen.IDGenerator) *PluginOAuthAut
type pluginOAuthAuthPO model.PluginOauthAuth type pluginOAuthAuthPO model.PluginOauthAuth
func (p pluginOAuthAuthPO) ToDO() *entity.AuthorizationCodeInfo { func (p pluginOAuthAuthPO) ToDO() *entity.AuthorizationCodeInfo {
secret := os.Getenv(utils.OAuthTokenSecretEnv)
if secret == "" {
secret = utils.DefaultOAuthTokenSecret
}
if p.RefreshToken != "" { if p.RefreshToken != "" {
refreshToken, err := utils.DecryptByAES(p.RefreshToken, utils.OAuthTokenSecretKey) refreshToken, err := utils.DecryptByAES(p.RefreshToken, secret)
if err == nil { if err == nil {
p.RefreshToken = string(refreshToken) p.RefreshToken = string(refreshToken)
} }
} }
if p.AccessToken != "" { if p.AccessToken != "" {
accessToken, err := utils.DecryptByAES(p.AccessToken, utils.OAuthTokenSecretKey) accessToken, err := utils.DecryptByAES(p.AccessToken, secret)
if err == nil { if err == nil {
p.AccessToken = string(accessToken) p.AccessToken = string(accessToken)
} }
@ -103,16 +109,20 @@ func (p *PluginOAuthAuthDAO) Upsert(ctx context.Context, info *entity.Authorizat
} }
meta := info.Meta meta := info.Meta
secret := os.Getenv(utils.OAuthTokenSecretEnv)
if secret == "" {
secret = utils.DefaultOAuthTokenSecret
}
var accessToken, refreshToken string var accessToken, refreshToken string
if info.AccessToken != "" { if info.AccessToken != "" {
accessToken, err = utils.EncryptByAES([]byte(info.AccessToken), utils.OAuthTokenSecretKey) accessToken, err = utils.EncryptByAES([]byte(info.AccessToken), secret)
if err != nil { if err != nil {
return err return err
} }
} }
if info.RefreshToken != "" { if info.RefreshToken != "" {
refreshToken, err = utils.EncryptByAES([]byte(info.RefreshToken), utils.OAuthTokenSecretKey) refreshToken, err = utils.EncryptByAES([]byte(info.RefreshToken), secret)
if err != nil { if err != nil {
return err return err
} }

View File

@ -437,7 +437,13 @@ func genAuthURL(info *entity.AuthorizationCodeInfo) (string, error) {
if err != nil { if err != nil {
return "", fmt.Errorf("marshal state failed, err=%v", err) return "", fmt.Errorf("marshal state failed, err=%v", err)
} }
encryptState, err := utils.EncryptByAES(stateStr, utils.StateSecretKey)
secret := os.Getenv(utils.StateSecretEnv)
if secret == "" {
secret = utils.DefaultStateSecret
}
encryptState, err := utils.EncryptByAES(stateStr, secret)
if err != nil { if err != nil {
return "", fmt.Errorf("encrypt state failed, err=%v", err) return "", fmt.Errorf("encrypt state failed, err=%v", err)
} }

View File

@ -20,18 +20,131 @@ import (
"bytes" "bytes"
"crypto/aes" "crypto/aes"
"crypto/cipher" "crypto/cipher"
"crypto/rand"
"encoding/base64" "encoding/base64"
"encoding/json"
"fmt" "fmt"
"io"
"github.com/bytedance/gopkg/util/logger"
) )
const ( const (
AuthSecretKey = "^*6x3hdu2nc%-p38" AuthSecretEnv = "PLUGIN_AES_AUTH_SECRET"
StateSecretKey = "osj^kfhsd*(z!sno" StateSecretEnv = "PLUGIN_AES_STATE_SECRET"
OAuthTokenSecretKey = "cn+$PJ(HhJ[5d*z9" OAuthTokenSecretEnv = "PLUGIN_AES_OAUTH_TOKEN_SECRET"
) )
func EncryptByAES(val []byte, secretKey string) (string, error) { const encryptVersion = "aes-cbc-v1"
sb := []byte(secretKey)
// In order to be compatible with the problem of no existing env configuration,
// these default values are temporarily retained.
const (
// Deprecated. Configuring AuthSecretEnv in env instead.
DefaultAuthSecret = "^*6x3hdu2nc%-p38"
// Deprecated. Configuring StateSecretEnv in env instead.
DefaultStateSecret = "osj^kfhsd*(z!sno"
// Deprecated. Configuring OAuthTokenSecretEnv in env instead.
DefaultOAuthTokenSecret = "cn+$PJ(HhJ[5d*z9"
)
type AESEncryption struct {
Version string `json:"version"`
IV []byte `json:"iv"`
EncryptedData []byte `json:"encrypted_data"`
}
func EncryptByAES(val []byte, secret string) (string, error) {
if secret == "" {
return "", fmt.Errorf("secret is required")
}
sb := []byte(secret)
block, err := aes.NewCipher(sb)
if err != nil {
return "", err
}
blockSize := block.BlockSize()
paddingData := pkcs7Padding(val, blockSize)
iv := make([]byte, blockSize)
if _, err = io.ReadFull(rand.Reader, iv); err != nil {
return "", err
}
encrypted := make([]byte, len(paddingData))
blockMode := cipher.NewCBCEncrypter(block, iv)
blockMode.CryptBlocks(encrypted, paddingData)
en := &AESEncryption{
Version: encryptVersion,
IV: iv,
EncryptedData: encrypted,
}
encrypted, err = json.Marshal(en)
if err != nil {
return "", err
}
return base64.RawURLEncoding.EncodeToString(encrypted), nil
}
func pkcs7Padding(data []byte, blockSize int) []byte {
padding := blockSize - len(data)%blockSize
padText := bytes.Repeat([]byte{byte(padding)}, padding)
return append(data, padText...)
}
func DecryptByAES(data, secret string) ([]byte, error) {
if secret == "" {
return nil, fmt.Errorf("secret is required")
}
enBytes, err := base64.RawURLEncoding.DecodeString(data)
if err != nil {
return nil, err
}
en := &AESEncryption{}
err = json.Unmarshal(enBytes, &en)
if err != nil { // fallback to unsafeEncryptByAES
logger.Warnf("failed to unmarshal encrypted data, fallback to unsafeEncryptByAES: %v", err)
return UnsafeDecryptByAES(data, secret)
}
sb := []byte(secret)
block, err := aes.NewCipher(sb)
if err != nil {
return nil, err
}
blockMode := cipher.NewCBCDecrypter(block, en.IV)
if len(en.EncryptedData)%blockMode.BlockSize() != 0 {
return nil, fmt.Errorf("invalid block size")
}
decrypted := make([]byte, len(en.EncryptedData))
blockMode.CryptBlocks(decrypted, en.EncryptedData)
decrypted, err = pkcs7UnPadding(decrypted)
if err != nil {
return nil, err
}
return decrypted, nil
}
// Deprecated: use EncryptByAES instead
// UnsafeEncryptByAES is an insecure encryption method,
// because the iv is fixed using the first 16 bits of the secret.
func UnsafeEncryptByAES(val []byte, secret string) (string, error) {
sb := []byte(secret)
block, err := aes.NewCipher(sb) block, err := aes.NewCipher(sb)
if err != nil { if err != nil {
@ -48,20 +161,18 @@ func EncryptByAES(val []byte, secretKey string) (string, error) {
return base64.RawURLEncoding.EncodeToString(encrypted), nil return base64.RawURLEncoding.EncodeToString(encrypted), nil
} }
func pkcs7Padding(data []byte, blockSize int) []byte { // Deprecated: use DecryptByAES instead
padding := blockSize - len(data)%blockSize // UnsafeDecryptByAES is an insecure decryption method,
padText := bytes.Repeat([]byte{byte(padding)}, padding) // because the iv is fixed using the first 16 bits of the secret.
// In order to be compatible with existing data that has been encrypted by UnsafeEncryptByAES,
return append(data, padText...) // this method is retained as a fallback decryption method.
} func UnsafeDecryptByAES(data, secret string) ([]byte, error) {
func DecryptByAES(data, secretKey string) ([]byte, error) {
dataBytes, err := base64.RawURLEncoding.DecodeString(data) dataBytes, err := base64.RawURLEncoding.DecodeString(data)
if err != nil { if err != nil {
return nil, err return nil, err
} }
sb := []byte(secretKey) sb := []byte(secret)
block, err := aes.NewCipher(sb) block, err := aes.NewCipher(sb)
if err != nil { if err != nil {

View File

@ -0,0 +1,50 @@
/*
* Copyright 2025 coze-dev Authors
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package utils
import (
"testing"
"github.com/bytedance/mockey"
"github.com/stretchr/testify/assert"
)
func TestDecryptByAES(t *testing.T) {
mockey.PatchConvey("unsafe encryption compatibility", t, func() {
secret := "test_secret_1234"
plaintext := []byte("test_plaintext")
encrypted, err := UnsafeEncryptByAES(plaintext, secret)
assert.NoError(t, err)
decrypted, err := DecryptByAES(encrypted, secret)
assert.NoError(t, err)
assert.Equal(t, plaintext, decrypted)
})
mockey.PatchConvey("safe encryption", t, func() {
secret := "test_secret_1234"
plaintext := []byte("test_plaintext")
encrypted, err := EncryptByAES(plaintext, secret)
assert.NoError(t, err)
decrypted, err := DecryptByAES(encrypted, secret)
assert.NoError(t, err)
assert.Equal(t, plaintext, decrypted)
})
}

View File

@ -219,3 +219,10 @@ export CODE_RUNNER_MEMORY_LIMIT_MB=""
export DISABLE_USER_REGISTRATION="" # default "", if you want to disable, set to true export DISABLE_USER_REGISTRATION="" # default "", if you want to disable, set to true
export ALLOW_REGISTRATION_EMAIL="" # is a list of email addresses, separated by ",". Example: "11@example.com,22@example.com" export ALLOW_REGISTRATION_EMAIL="" # is a list of email addresses, separated by ",". Example: "11@example.com,22@example.com"
# Plugin AES secret
# PLUGIN_AES_AUTH_SECRET is the secret of used to encrypt plugin authorization payload.
export PLUGIN_AES_AUTH_SECRET="^*6x3hdu2nc%-p38"
# PLUGIN_AES_STATE_SECRET is the secret of used to encrypt oauth state.
export PLUGIN_AES_STATE_SECRET="osj^kfhsd*(z!sno"
# PLUGIN_AES_OAUTH_TOKEN_SECRET is the secret of used to encrypt oauth refresh token and access token.
export PLUGIN_AES_OAUTH_TOKEN_SECRET="cn+$PJ(HhJ[5d*z9"

View File

@ -219,3 +219,10 @@ export CODE_RUNNER_MEMORY_LIMIT_MB=""
export DISABLE_USER_REGISTRATION="" # default "", if you want to disable, set to true export DISABLE_USER_REGISTRATION="" # default "", if you want to disable, set to true
export ALLOW_REGISTRATION_EMAIL="" # is a list of email addresses, separated by ",". Example: "11@example.com,22@example.com" export ALLOW_REGISTRATION_EMAIL="" # is a list of email addresses, separated by ",". Example: "11@example.com,22@example.com"
# Plugin AES secret
# PLUGIN_AES_AUTH_SECRET is the secret of used to encrypt plugin authorization payload.
export PLUGIN_AES_AUTH_SECRET="^*6x3hdu2nc%-p38"
# PLUGIN_AES_STATE_SECRET is the secret of used to encrypt oauth state.
export PLUGIN_AES_STATE_SECRET="osj^kfhsd*(z!sno"
# PLUGIN_AES_OAUTH_TOKEN_SECRET is the secret of used to encrypt oauth refresh token and access token.
export PLUGIN_AES_OAUTH_TOKEN_SECRET="cn+$PJ(HhJ[5d*z9"