Skip to content

Commit 743aa80

Browse files
Improved cloudflarecakey detector (#3688)
* refactored cloudflarecakey detector * resolved comments * close the resp body
1 parent f17ad81 commit 743aa80

File tree

2 files changed

+46
-27
lines changed

2 files changed

+46
-27
lines changed

pkg/detectors/cloudflarecakey/cloudflarecakey.go

Lines changed: 43 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,9 @@ package cloudflarecakey
22

33
import (
44
"context"
5+
"fmt"
6+
"io"
57
"net/http"
6-
"strings"
78

89
regexp "github.com/wasilibs/go-re2"
910

@@ -20,7 +21,8 @@ var _ detectors.Detector = (*Scanner)(nil)
2021
var (
2122
client = common.SaneHttpClient()
2223

23-
keyPat = regexp.MustCompile(detectors.PrefixRegex([]string{"cloudflare"}) + `\b(v[A-Za-z0-9._-]{173,})\b`)
24+
// origin ca keys documentation: https://developers.cloudflare.com/fundamentals/api/get-started/ca-keys/
25+
keyPat = regexp.MustCompile(`\b(v1\.0-[A-Za-z0-9-]{171})\b`)
2426
)
2527

2628
// Keywords are used for efficiently pre-filtering chunks.
@@ -33,35 +35,22 @@ func (s Scanner) Keywords() []string {
3335
func (s Scanner) FromData(ctx context.Context, verify bool, data []byte) (results []detectors.Result, err error) {
3436
dataStr := string(data)
3537

36-
matches := keyPat.FindAllStringSubmatch(dataStr, -1)
38+
uniqueMatches := make(map[string]struct{})
3739

38-
for _, match := range matches {
39-
if len(match) != 2 {
40-
continue
41-
}
42-
resMatch := strings.TrimSpace(match[1])
40+
for _, matches := range keyPat.FindAllStringSubmatch(dataStr, -1) {
41+
uniqueMatches[matches[1]] = struct{}{}
42+
}
4343

44+
for caKey := range uniqueMatches {
4445
s1 := detectors.Result{
4546
DetectorType: detectorspb.DetectorType_CloudflareCaKey,
46-
Raw: []byte(resMatch),
47+
Raw: []byte(caKey),
4748
}
4849

4950
if verify {
50-
req, err := http.NewRequestWithContext(ctx, "GET", "https://api.cloudflare.com/client/v4/certificates?zone_id=a", nil)
51-
if err != nil {
52-
continue
53-
}
54-
req.Header.Add("Content-Type", "application/json")
55-
req.Header.Add("user-agent", "curl/7.68.0") // pretend to be from curl so we do not wait 100+ seconds -> nice try did not work
56-
57-
req.Header.Add("X-Auth-User-Service-Key", resMatch)
58-
res, err := client.Do(req)
59-
if err == nil {
60-
defer res.Body.Close()
61-
if res.StatusCode >= 200 && res.StatusCode < 300 {
62-
s1.Verified = true
63-
}
64-
}
51+
isVerified, verificationErr := verifyCloudFlareCAKey(ctx, client, caKey)
52+
s1.Verified = isVerified
53+
s1.SetVerificationError(verificationErr, caKey)
6554
}
6655

6756
results = append(results, s1)
@@ -77,3 +66,33 @@ func (s Scanner) Type() detectorspb.DetectorType {
7766
func (s Scanner) Description() string {
7867
return "Cloudflare is a web infrastructure and website security company. Cloudflare CA keys can be used to manage SSL/TLS certificates and other security settings."
7968
}
69+
70+
func verifyCloudFlareCAKey(ctx context.Context, client *http.Client, caKey string) (bool, error) {
71+
req, err := http.NewRequestWithContext(ctx, "GET", "https://api.cloudflare.com/client/v4/certificates?zone_id=a", nil)
72+
if err != nil {
73+
return false, nil
74+
}
75+
76+
req.Header.Add("Content-Type", "application/json")
77+
req.Header.Add("user-agent", "curl/7.68.0") // pretend to be from curl so we do not wait 100+ seconds -> nice try did not work
78+
79+
req.Header.Add("X-Auth-User-Service-Key", caKey)
80+
resp, err := client.Do(req)
81+
if err != nil {
82+
return false, err
83+
}
84+
85+
defer func() {
86+
_, _ = io.Copy(io.Discard, resp.Body)
87+
_ = resp.Body.Close()
88+
}()
89+
90+
switch resp.StatusCode {
91+
case http.StatusOK:
92+
return true, nil
93+
case http.StatusUnauthorized, http.StatusForbidden:
94+
return false, nil
95+
default:
96+
return false, fmt.Errorf("unexpected status code: %d", resp.StatusCode)
97+
}
98+
}

pkg/detectors/cloudflarecakey/cloudflarecakey_test.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,14 +21,14 @@ var (
2121
2222
api:
2323
auth_type: "API-Key"
24-
base_url: "https://api.example.com/v1/user"
25-
cloudflare: "vR2hGdmAyzLxI4kR34v-fgtaIug7VC_xudRuku6UQd5t9RoiY3zGiuVxMGiN6qR6O0cGjbGepFsHHrfm-9QmBahS.tvHRjYvf_c5XOKReWeVXsp3T-_gilqReVlS-U_9vj1tcMAwRjWCcehKiCOPnXEeN.Xg.lmwp0.mAIsgbrdPJsJE4hz7OF5PQ7D"
24+
base_url: "https://api.cloudflare.com/v1/user"
25+
ca_key: "v1.0-13vvv5141b975834504fc75b-a670d21e1e012816c3c8d9745e2693adc2d2ec7c402f607dbf7f2bd5de3bdb490cce4420ef13179957c5651e1ee5d952b1e03bd0271e2b43a9847f0713f4d3942cde4a7bc2e4770615"
2626
2727
# Notes:
2828
# - Remember to rotate the secret every 90 days.
2929
# - The above credentials should only be used in a secure environment.
3030
`
31-
secret = "vR2hGdmAyzLxI4kR34v-fgtaIug7VC_xudRuku6UQd5t9RoiY3zGiuVxMGiN6qR6O0cGjbGepFsHHrfm-9QmBahS.tvHRjYvf_c5XOKReWeVXsp3T-_gilqReVlS-U_9vj1tcMAwRjWCcehKiCOPnXEeN.Xg.lmwp0.mAIsgbrdPJsJE4hz7OF5PQ7D"
31+
secret = "v1.0-13vvv5141b975834504fc75b-a670d21e1e012816c3c8d9745e2693adc2d2ec7c402f607dbf7f2bd5de3bdb490cce4420ef13179957c5651e1ee5d952b1e03bd0271e2b43a9847f0713f4d3942cde4a7bc2e4770615"
3232
)
3333

3434
func TestCloudFlareCAKey_Pattern(t *testing.T) {

0 commit comments

Comments
 (0)