From 6ee7b521fa7531ef356ececc8be7575c3800f872 Mon Sep 17 00:00:00 2001 From: Yee Cheng Chin Date: Sun, 1 Oct 2023 09:13:22 +0200 Subject: [PATCH] patch 9.0.1968: cmdline completion should consider key option Problem: cmdline completion should consider key option Solution: Disable cmdline completion for key option, slightly refactor how P_NO_CMD_EXPAND is handled Harden crypto 'key' option: turn off cmdline completion, disable set-= "set-=" can be used maliciously with a crypto key, as it allows an attacker (who either has access to the computer or a plugin author) to guess a substring by observing the modified state. Simply turn off set+=/-=/^= for this option as there is no good reason for them to be used. Update docs to make that clear as well. Also, don't allow cmdline completion for 'key' as it just shows ***** which is not useful and confusing to the user what it means (if the user accidentally hits enter they will have replaced their key with "*****" instead). Move logic to better location, don't use above 32-bit for flags Move P_NO_CMD_EXPAND to use the unused 0x20 instead of going above 32-bits, as currently the flags parameter is only 32-bits on some systems. Left a comment to warn that future additions will need to change how the flags work either by making it 64-bit or split into two member vars. Also, move the logic for detecting P_NO_CMD_EXPAND earlier so it's not up to each handler to decide, and you won't see the temporary "..." that Vim shows while waiting for completion handler to complete. closes: #13224 Signed-off-by: Christian Brabandt Co-authored-by: Yee Cheng Chin --- runtime/doc/options.txt | 2 ++ src/option.c | 20 +++++++++++--------- src/option.h | 5 +++++ src/optiondefs.h | 2 +- src/optionstr.c | 8 +++++++- src/proto/optionstr.pro | 2 +- src/structs.h | 8 ++++++++ src/testdir/test_crypt.vim | 23 +++++++++++++++++++++++ src/testdir/test_history.vim | 5 +++++ src/testdir/test_options.vim | 16 +++++++++------- src/version.c | 2 ++ 11 files changed, 74 insertions(+), 19 deletions(-) diff --git a/runtime/doc/options.txt b/runtime/doc/options.txt index 090399af03..a24dd0490d 100644 --- a/runtime/doc/options.txt +++ b/runtime/doc/options.txt @@ -4928,6 +4928,8 @@ A jump table for the options with a short description can be found at |Q_op|. "echo &key". This is to avoid showing it to someone who shouldn't know. It also means you cannot see it yourself once you have set it, be careful not to make a typing error! + You also cannot use |:set-=|, |:set+=|, |:set^=| on this option to + prevent an attacker from guessing substrings in your key. You can use "&key" in an expression to detect whether encryption is enabled. When 'key' is set it returns "*****" (five stars). diff --git a/src/option.c b/src/option.c index d2096a5f0d..c1d80fa815 100644 --- a/src/option.c +++ b/src/option.c @@ -1314,13 +1314,6 @@ ex_set(exarg_T *eap) /* * :set operator types */ -typedef enum { - OP_NONE = 0, - OP_ADDING, // "opt+=arg" - OP_PREPENDING, // "opt^=arg" - OP_REMOVING, // "opt-=arg" -} set_op_T; - typedef enum { PREFIX_NO = 0, // "no" prefix PREFIX_NONE, // no prefix @@ -1935,7 +1928,7 @@ do_set_option_string( char_u **argp, int nextchar, set_op_T op_arg, - int flags, + long_u flags, int cp_val, char_u *varp_arg, char *errbuf, @@ -2037,7 +2030,7 @@ do_set_option_string( // be triggered that can cause havoc. *errmsg = did_set_string_option( opt_idx, (char_u **)varp, oldval, newval, errbuf, - opt_flags, value_checked); + opt_flags, op, value_checked); secure = secure_saved; } @@ -7376,6 +7369,15 @@ set_context_in_set_cmd( else expand_option_idx = opt_idx; + if (!is_term_option) + { + if (options[opt_idx].flags & P_NO_CMD_EXPAND) + { + xp->xp_context=EXPAND_UNSUCCESSFUL; + return; + } + } + xp->xp_pattern = p + 1; expand_option_start_col = (int)(p + 1 - xp->xp_line); diff --git a/src/option.h b/src/option.h index ced4f3e4b7..396c568d49 100644 --- a/src/option.h +++ b/src/option.h @@ -25,6 +25,7 @@ // the same. #define P_EXPAND 0x10 // environment expansion. NOTE: P_EXPAND can // never be used for local or hidden options! +#define P_NO_CMD_EXPAND 0x20 // don't perform cmdline completions #define P_NODEFAULT 0x40 // don't set to default value #define P_DEF_ALLOCED 0x80 // default value is in allocated memory, must // use vim_free() when assigning new value @@ -61,6 +62,10 @@ #define P_MLE 0x20000000L // under control of 'modelineexpr' #define P_FUNC 0x40000000L // accept a function reference or a lambda #define P_COLON 0x80000000L // values use colons to create sublists +// Warning: Currently we have used all 32 bits for option flags. On some 32-bit +// systems, the flags are stored as a 32-bit integer, and adding more +// flags will overflow it. Adding another flag will need to change how +// it's stored first. // Returned by get_option_value(). typedef enum { diff --git a/src/optiondefs.h b/src/optiondefs.h index 08de5bf406..f850d19b1c 100644 --- a/src/optiondefs.h +++ b/src/optiondefs.h @@ -1467,7 +1467,7 @@ static struct vimoption options[] = {"jumpoptions", "jop", P_STRING|P_VI_DEF|P_VIM|P_ONECOMMA|P_NODUP, (char_u *)&p_jop, PV_NONE, did_set_jumpoptions, expand_set_jumpoptions, {(char_u *)"", (char_u *)0L} SCTX_INIT}, - {"key", NULL, P_STRING|P_ALLOCED|P_VI_DEF|P_NO_MKRC, + {"key", NULL, P_STRING|P_ALLOCED|P_VI_DEF|P_NO_MKRC|P_NO_CMD_EXPAND, #ifdef FEAT_CRYPT (char_u *)&p_key, PV_KEY, did_set_cryptkey, NULL, {(char_u *)"", (char_u *)0L} diff --git a/src/optionstr.c b/src/optionstr.c index 88532ee599..5a3dd6e758 100644 --- a/src/optionstr.c +++ b/src/optionstr.c @@ -579,7 +579,7 @@ set_string_option( } #endif if ((errmsg = did_set_string_option(opt_idx, varp, oldval, value, errbuf, - opt_flags, &value_checked)) == NULL) + opt_flags, OP_NONE, &value_checked)) == NULL) did_set_option(opt_idx, opt_flags, TRUE, value_checked); #if defined(FEAT_EVAL) @@ -1578,6 +1578,10 @@ did_set_cryptkey(optset_T *args) // history. remove_key_from_history(); + if (args->os_op != OP_NONE) + // Don't allow set+=/-=/^= as they can allow for substring guessing + return e_invalid_argument; + if (STRCMP(curbuf->b_p_key, args->os_oldval.string) != 0) { // Need to update the swapfile. @@ -4209,6 +4213,7 @@ did_set_string_option( char_u *value, // new value of the option char *errbuf, // buffer for errors, or NULL int opt_flags, // OPT_LOCAL and/or OPT_GLOBAL + set_op_T op, // OP_ADDING/OP_PREPENDING/OP_REMOVING int *value_checked) // value was checked to be safe, no // need to set P_INSECURE { @@ -4247,6 +4252,7 @@ did_set_string_option( args.os_varp = (char_u *)varp; args.os_idx = opt_idx; args.os_flags = opt_flags; + args.os_op = op; args.os_oldval.string = oldval; args.os_newval.string = value; args.os_errbuf = errbuf; diff --git a/src/proto/optionstr.pro b/src/proto/optionstr.pro index b4d9dfc95d..48cccea8cc 100644 --- a/src/proto/optionstr.pro +++ b/src/proto/optionstr.pro @@ -121,7 +121,7 @@ char *did_set_wildmode(optset_T *args); char *did_set_wildoptions(optset_T *args); char *did_set_winaltkeys(optset_T *args); char *did_set_wincolor(optset_T *args); -char *did_set_string_option(int opt_idx, char_u **varp, char_u *oldval, char_u *value, char *errbuf, int opt_flags, int *value_checked); +char *did_set_string_option(int opt_idx, char_u **varp, char_u *oldval, char_u *value, char *errbuf, int opt_flags, set_op_T op, int *value_checked); int expand_set_ambiwidth(optexpand_T *args, int *numMatches, char_u ***matches); int expand_set_background(optexpand_T *args, int *numMatches, char_u ***matches); int expand_set_backspace(optexpand_T *args, int *numMatches, char_u ***matches); diff --git a/src/structs.h b/src/structs.h index d05ae872d5..1508f47914 100644 --- a/src/structs.h +++ b/src/structs.h @@ -588,6 +588,13 @@ typedef enum { XP_PREFIX_INV, // "inv" prefix for bool option } xp_prefix_T; +typedef enum { + OP_NONE = 0, + OP_ADDING, // "opt+=arg" + OP_PREPENDING, // "opt^=arg" + OP_REMOVING, // "opt-=arg" +} set_op_T; + /* * used for completion on the command line */ @@ -4876,6 +4883,7 @@ typedef struct char_u *os_varp; int os_idx; int os_flags; + set_op_T os_op; // old value of the option (can be a string, number or a boolean) union diff --git a/src/testdir/test_crypt.vim b/src/testdir/test_crypt.vim index 1782d83f32..85ed5740a1 100644 --- a/src/testdir/test_crypt.vim +++ b/src/testdir/test_crypt.vim @@ -438,4 +438,27 @@ func Test_crypt_set_key_segfault() bwipe! endfunc +func Test_crypt_set_key_disallow_append_subtract() + new Xtest4 + + set key=foobar + call assert_true(&modified) + setl nomodified + + call assert_fails('set key-=foo', 'E474:') + call assert_fails('set key-=bar', 'E474:') + call assert_fails('set key-=foobar', 'E474:') + call assert_fails('set key-=test1', 'E474:') + + call assert_false(&modified) + call assert_equal('*****', &key) + + call assert_fails('set key+=test2', 'E474:') + call assert_fails('set key^=test3', 'E474:') + + call assert_false(&modified) + set key= + bwipe! +endfunc + " vim: shiftwidth=2 sts=2 expandtab diff --git a/src/testdir/test_history.vim b/src/testdir/test_history.vim index f1c31dee04..bb6d671725 100644 --- a/src/testdir/test_history.vim +++ b/src/testdir/test_history.vim @@ -244,8 +244,13 @@ endfunc " Test for making sure the key value is not stored in history func Test_history_crypt_key() CheckFeature cryptv + call feedkeys(":set bs=2 key=abc ts=8\", 'xt') call assert_equal('set bs=2 key= ts=8', histget(':')) + + call assert_fails("call feedkeys(':set bs=2 key-=abc ts=8\', 'xt')") + call assert_equal('set bs=2 key-= ts=8', histget(':')) + set key& bs& ts& endfunc diff --git a/src/testdir/test_options.vim b/src/testdir/test_options.vim index 32d4910ccb..8cd50694c9 100644 --- a/src/testdir/test_options.vim +++ b/src/testdir/test_options.vim @@ -365,13 +365,15 @@ func Test_set_completion() call feedkeys(":set spellsuggest=best,file:test_options.v\\\"\", 'xt') call assert_equal("\"set spellsuggest=best,file:test_options.vim", @:) - " Expand value for 'key' - set key=abcd - call feedkeys(":set key=\\\"\", 'xt') - call assert_equal('"set key=*****', @:) - call feedkeys(":set key-=\\\"\", 'xt') - call assert_equal('"set key-=*****', @:) - set key= + " Expanding value for 'key' is disallowed + if exists('+key') + set key=abcd + call feedkeys(":set key=\\\"\", 'xt') + call assert_equal('"set key=', @:) + call feedkeys(":set key-=\\\"\", 'xt') + call assert_equal('"set key-=', @:) + set key= + endif " Expand values for 'filetype' call feedkeys(":set filetype=sshdconfi\\\"\", 'xt') diff --git a/src/version.c b/src/version.c index a46db2a853..1be1462768 100644 --- a/src/version.c +++ b/src/version.c @@ -704,6 +704,8 @@ static char *(features[]) = static int included_patches[] = { /* Add new patch number below this line */ +/**/ + 1968, /**/ 1967, /**/