security: implement 6 high-severity vulnerability fixes
HIGH-SEVERITY FIXES (Fase 2): 1. Rate Limiting (Vulnerabilidade 2.1) - express-rate-limit: 100 req/15min (prod), 1000 req/15min (dev) - Applied to all /api/* routes - Standard headers for retry-after 2. CORS Restrictions (Vulnerabilidade 2.2) - Whitelist: dashboard.descomplicar.pt, desk.descomplicar.pt - Localhost only in development - CORS blocking logs 3. Input Validation with Zod (Vulnerabilidade 2.4) - Generic validateRequest() middleware - Schemas: WordPress Monitor, server metrics, dashboard, financial - Applied to api/routes/wp-monitor.ts POST endpoint - Detailed field-level error messages 4. Backend Authentication OIDC (Vulnerabilidade 2.5 - OPTIONAL) - Enabled via OIDC_ENABLED=true - Bearer token validation on all APIs - Backward compatible (disabled by default) 5. SSH Key-Based Auth Migration (Vulnerabilidade 2.6) - Script: /media/ealmeida/Dados/Dev/ClaudeDev/migrate-ssh-keys.sh - Generates ed25519 key, copies to 6 servers - Instructions to remove passwords from .env - .env.example updated with SSH_PRIVATE_KEY_PATH 6. Improved Error Handling (Vulnerabilidade 2.5) - Unique error IDs (UUID) for tracking - Structured JSON logs in production - Stack traces blocked in production - Generic messages to client FILES CHANGED: - api/server.ts - Complete refactor with all security improvements - api/middleware/validation.ts - NEW: Zod middleware and schemas - api/routes/wp-monitor.ts - Added Zod validation on POST - .env.example - Complete security documentation - CHANGELOG.md - Full documentation of 9 fixes (3 critical + 6 high) - package.json + package-lock.json - New dependencies DEPENDENCIES ADDED: - express-rate-limit@7.x - zod@3.x - express-openid-connect@2.x AUDIT STATUS: - npm audit: 0 vulnerabilities - Hook Regra #47: PASSED PROGRESS: - Phase 1 (Critical): 3/3 ✅ COMPLETE - Phase 2 (High): 6/6 ✅ COMPLETE - Phase 3 (Medium): 0/6 - Next - Phase 4 (Low): 0/5 - Next Related: AUDIT-REPORT.md vulnerabilities 2.1, 2.2, 2.4, 2.5, 2.6 Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
This commit is contained in:
0
api/routes/dashboard.ts
Normal file → Executable file
0
api/routes/dashboard.ts
Normal file → Executable file
0
api/routes/diagnostic.ts
Normal file → Executable file
0
api/routes/diagnostic.ts
Normal file → Executable file
0
api/routes/hetzner.ts
Normal file → Executable file
0
api/routes/hetzner.ts
Normal file → Executable file
0
api/routes/monitor.ts
Normal file → Executable file
0
api/routes/monitor.ts
Normal file → Executable file
0
api/routes/server-metrics.ts
Normal file → Executable file
0
api/routes/server-metrics.ts
Normal file → Executable file
@@ -9,6 +9,7 @@
|
||||
import { Router } from 'express'
|
||||
import type { Request, Response } from 'express'
|
||||
import db from '../db.js'
|
||||
import { validateRequest, wpMonitorSchema } from '../middleware/validation.js'
|
||||
|
||||
const router = Router()
|
||||
|
||||
@@ -64,13 +65,9 @@ router.get('/', validateApiKey, async (req: Request, res: Response) => {
|
||||
})
|
||||
|
||||
// Receive data from WordPress plugin
|
||||
router.post('/', validateApiKey, async (req: Request, res: Response) => {
|
||||
router.post('/', validateApiKey, validateRequest(wpMonitorSchema), async (req: Request, res: Response) => {
|
||||
const data = req.body
|
||||
|
||||
if (!data || !data.site_url) {
|
||||
return res.status(400).json({ error: 'Bad Request', message: 'Invalid JSON or missing site_url' })
|
||||
}
|
||||
|
||||
try {
|
||||
const siteUrl = data.site_url.replace(/\/$/, '')
|
||||
const siteName = data.site_name || new URL(siteUrl).hostname
|
||||
|
||||
Reference in New Issue
Block a user