From 1c46d7345c7f57b1da2241a95a92ca7b8482a8cb Mon Sep 17 00:00:00 2001 From: duffyduck Date: Thu, 23 Apr 2026 22:06:16 +0200 Subject: [PATCH] Security-Hardening: IDOR-Fixes, XSS-Sanitizer, CORS+Helmet, Data-Exposure MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Umfassender Security-Review vor öffentlichem Deployment. Detaillierter Report in docs/SECURITY-REVIEW.md. 🔴 KRITISCHE FIXES: 1. CORS offen → jetzt nur explizite Origins (via CORS_ORIGINS env), in Production per default komplett aus (gleiche Origin erzwingt Browser). 2. Keine Security-Headers → helmet-Middleware hinzugefügt. X-Frame-Options, X-Content-Type-Options, HSTS, Referrer-Policy, CORP. 3. JWT-Fallback-Secret entfernt. Beim Server-Start wird jetzt geprüft ob JWT_SECRET (min 32 Zeichen) und ENCRYPTION_KEY (exakt 64 Hex) gesetzt sind, sonst Fail-Fast mit klarer Fehlermeldung. 4. IDOR bei 7 Contract-Endpoints. Portal-Kunden mit 'contracts:read' konnten über geratene IDs fremde Daten abrufen (Passwort, SIM-PIN/PUK, Internet-Zugangsdaten, SIP-Credentials, Vertragsdokumente, Rechnungen). Neuer Helper canAccessContract() in utils/accessControl.ts in allen betroffenen Endpoints eingebaut. Prüft Vertrag-Besitzer + Vollmachten. 5. XSS via Email-Body. email.htmlBody wurde ungefiltert via dangerouslySetInnerHTML gerendert. Angreifer konnte Mail mit ` in HTML-Body senden, + im Email-Client öffnen → kein Alert +3. **Rate-Limit-Tests:** 11x falsch einloggen → muss blocken +4. **Password-Reset-Tests:** Reset-Link 2x nutzen → zweites Mal fehlschlägt + +## Übersicht der Code-Änderungen + +| Datei | Änderung | +|---|---| +| `backend/src/index.ts` | Helmet, CORS-Config, Body-Limit, ENV-Check beim Start | +| `backend/src/middleware/auth.ts` | JWT-Fallback raus, Portal-Token-Invalidation | +| `backend/src/services/auth.service.ts` | JWT-Fallback raus, `portalTokenInvalidatedAt` setzen | +| `backend/src/utils/accessControl.ts` | **NEU** – `canAccessContract`, `canAccessCustomer` | +| `backend/src/utils/sanitize.ts` | **NEU** – Sanitizer für Customer/User | +| `backend/src/controllers/contract.controller.ts` | IDOR-Schutz in 5 Endpoints | +| `backend/src/controllers/invoice.controller.ts` | IDOR-Schutz in 2 Endpoints | +| `backend/src/controllers/customer.controller.ts` | Sanitizer in getCustomer/getCustomers | +| `backend/prisma/schema.prisma` | `Customer.portalTokenInvalidatedAt` | +| `frontend/src/components/email/EmailDetail.tsx` | DOMPurify für htmlBody | diff --git a/frontend/package-lock.json b/frontend/package-lock.json index f5c37407..7d1a2a41 100644 --- a/frontend/package-lock.json +++ b/frontend/package-lock.json @@ -14,6 +14,7 @@ "@tiptap/react": "^3.19.0", "@tiptap/starter-kit": "^3.19.0", "axios": "^1.7.7", + "dompurify": "^3.4.1", "lucide-react": "^0.454.0", "react": "^18.3.1", "react-dom": "^18.3.1", @@ -22,6 +23,7 @@ "react-router-dom": "^6.28.0" }, "devDependencies": { + "@types/dompurify": "^3.0.5", "@types/react": "^18.3.12", "@types/react-dom": "^18.3.1", "@vitejs/plugin-react": "^4.3.3", @@ -1595,6 +1597,16 @@ "@babel/types": "^7.28.2" } }, + "node_modules/@types/dompurify": { + "version": "3.0.5", + "resolved": "https://registry.npmjs.org/@types/dompurify/-/dompurify-3.0.5.tgz", + "integrity": "sha512-1Wg0g3BtQF7sSb27fJQAKck1HECM6zV1EB66j8JH9i3LCjYabJa0FSdiSgsD5K/RbrsR0SiraKacLB+T8ZVYAg==", + "dev": true, + "license": "MIT", + "dependencies": { + "@types/trusted-types": "*" + } + }, "node_modules/@types/estree": { "version": "1.0.8", "resolved": "https://registry.npmjs.org/@types/estree/-/estree-1.0.8.tgz", @@ -1642,6 +1654,13 @@ "@types/react": "^18.0.0" } }, + "node_modules/@types/trusted-types": { + "version": "2.0.7", + "resolved": "https://registry.npmjs.org/@types/trusted-types/-/trusted-types-2.0.7.tgz", + "integrity": "sha512-ScaPdn1dQczgbl0QFTeTOmVHFULt394XJgOQNoyVhZ6r2vLnMLJfBPd53SB52T/3G36VI1/g2MZaX0cwDuXsfw==", + "devOptional": true, + "license": "MIT" + }, "node_modules/@types/use-sync-external-store": { "version": "0.0.6", "resolved": "https://registry.npmjs.org/@types/use-sync-external-store/-/use-sync-external-store-0.0.6.tgz", @@ -1976,6 +1995,15 @@ "integrity": "sha512-+HlytyjlPKnIG8XuRG8WvmBP8xs8P71y+SKKS6ZXWoEgLuePxtDoUEiH7WkdePWrQ5JBpE6aoVqfZfJUQkjXwA==", "dev": true }, + "node_modules/dompurify": { + "version": "3.4.1", + "resolved": "https://registry.npmjs.org/dompurify/-/dompurify-3.4.1.tgz", + "integrity": "sha512-JahakDAIg1gyOm7dlgWSDjV4n7Ip2PKR55NIT6jrMfIgLFgWo81vdr1/QGqWtFNRqXP9UV71oVePtjqS2ebnPw==", + "license": "(MPL-2.0 OR Apache-2.0)", + "optionalDependencies": { + "@types/trusted-types": "^2.0.7" + } + }, "node_modules/dunder-proto": { "version": "1.0.1", "resolved": "https://registry.npmjs.org/dunder-proto/-/dunder-proto-1.0.1.tgz", diff --git a/frontend/package.json b/frontend/package.json index c848d9e8..d9a229c4 100644 --- a/frontend/package.json +++ b/frontend/package.json @@ -14,6 +14,7 @@ "@tiptap/react": "^3.19.0", "@tiptap/starter-kit": "^3.19.0", "axios": "^1.7.7", + "dompurify": "^3.4.1", "lucide-react": "^0.454.0", "react": "^18.3.1", "react-dom": "^18.3.1", @@ -22,6 +23,7 @@ "react-router-dom": "^6.28.0" }, "devDependencies": { + "@types/dompurify": "^3.0.5", "@types/react": "^18.3.12", "@types/react-dom": "^18.3.1", "@vitejs/plugin-react": "^4.3.3", diff --git a/frontend/src/components/email/EmailDetail.tsx b/frontend/src/components/email/EmailDetail.tsx index f8788b82..999b1079 100644 --- a/frontend/src/components/email/EmailDetail.tsx +++ b/frontend/src/components/email/EmailDetail.tsx @@ -1,5 +1,6 @@ import { useState, useEffect } from 'react'; import { Reply, Star, Paperclip, Link2, X, Download, ExternalLink, Trash2, Undo2, Save, FileDown } from 'lucide-react'; +import DOMPurify from 'dompurify'; import { CachedEmail, cachedEmailApi } from '../../services/api'; import { useMutation, useQueryClient } from '@tanstack/react-query'; import Button from '../ui/Button'; @@ -384,7 +385,16 @@ export default function EmailDetail({ {showHtml && email.htmlBody ? (
) : (