protect with xss for login
This commit is contained in:
parent
90754c1792
commit
de7b3a66f9
112
Sean/server.js
112
Sean/server.js
@ -6,7 +6,7 @@ const bcrypt = require("bcrypt");
|
|||||||
const crypto = require("crypto");
|
const crypto = require("crypto");
|
||||||
const nodemailer = require("nodemailer");
|
const nodemailer = require("nodemailer");
|
||||||
const otpGenerator = require('otp-generator');
|
const otpGenerator = require('otp-generator');
|
||||||
|
const { body, validationResult } = require('express-validator');
|
||||||
|
|
||||||
const { transporter } = require("./modules/nodeMailer");
|
const { transporter } = require("./modules/nodeMailer");
|
||||||
const { connection } = require("./modules/mysql");
|
const { connection } = require("./modules/mysql");
|
||||||
@ -20,7 +20,7 @@ require("dotenv").config();
|
|||||||
app.use(bodyParser.urlencoded({ extended: true }));
|
app.use(bodyParser.urlencoded({ extended: true }));
|
||||||
app.use(
|
app.use(
|
||||||
session({
|
session({
|
||||||
secret: "your_session_secret",
|
secret: process.env.key,
|
||||||
resave: false,
|
resave: false,
|
||||||
saveUninitialized: true,
|
saveUninitialized: true,
|
||||||
})
|
})
|
||||||
@ -100,67 +100,79 @@ const logActivity = async (username, success, message) => {
|
|||||||
|
|
||||||
|
|
||||||
// Login route
|
// Login route
|
||||||
app.post("/login", async (req, res) => {
|
app.post('/login',[
|
||||||
try {
|
body('username').escape().trim().isLength({ min: 1 }).withMessage('Username must not be empty'),
|
||||||
let { username, password } = req.body;
|
body('password').escape().trim().isLength({ min: 1 }).withMessage('Password must not be empty'),
|
||||||
username = username.trim();
|
],
|
||||||
|
async (req, res) => {
|
||||||
|
try {
|
||||||
|
const errors = validationResult(req);
|
||||||
|
|
||||||
const loginSql = "SELECT * FROM users WHERE username = ?";
|
if (!errors.isEmpty()) {
|
||||||
const updateLastLoginSql = "UPDATE users SET lastLogin = CURRENT_TIMESTAMP WHERE username = ?";
|
// Handle validation errors, e.g., return an error message to the client
|
||||||
|
return res.render('login', { error: 'Invalid input. Please check your credentials.' });
|
||||||
connection.query(loginSql, [username], async (error, results) => {
|
|
||||||
if (error) {
|
|
||||||
console.error("Error executing login query:", error);
|
|
||||||
res.status(500).send("Internal Server Error");
|
|
||||||
return;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (results.length > 0) {
|
let { username, password } = req.body;
|
||||||
const isLoginSuccessful = await bcrypt.compare(password, results[0].password);
|
username = username.trim();
|
||||||
|
|
||||||
if (isLoginSuccessful) {
|
const loginSql = "SELECT * FROM users WHERE username = ?";
|
||||||
// Log successful login attempt
|
const updateLastLoginSql = "UPDATE users SET lastLogin = CURRENT_TIMESTAMP WHERE username = ?";
|
||||||
await logActivity(username, true, "Credentials entered correctly");
|
|
||||||
|
|
||||||
const user = results[0];
|
connection.query(loginSql, [username], async (error, results) => {
|
||||||
const { otp, expirationTime } = generateOTP();
|
if (error) {
|
||||||
|
console.error("Error executing login query:", error);
|
||||||
|
res.status(500).send("Internal Server Error");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
// Store the OTP and expiration time in the session for verification
|
if (results.length > 0) {
|
||||||
req.session.otp = otp;
|
const isLoginSuccessful = await bcrypt.compare(password, results[0].password);
|
||||||
req.session.otpExpiration = expirationTime;
|
|
||||||
req.session.save();
|
|
||||||
|
|
||||||
// Send OTP via email
|
if (isLoginSuccessful) {
|
||||||
try {
|
// Log successful login attempt
|
||||||
await sendOTPByEmail(user.email, otp);
|
await logActivity(username, true, "Credentials entered correctly");
|
||||||
// Log successful OTP sending
|
|
||||||
await logActivity(username, true, "OTP successfully sent to user");
|
const user = results[0];
|
||||||
} catch (sendOTPError) {
|
const { otp, expirationTime } = generateOTP();
|
||||||
// Log unsuccessful OTP sending
|
|
||||||
await logActivity(username, false, "OTP failed to send to user");
|
// Store the OTP and expiration time in the session for verification
|
||||||
console.error("Error sending OTP:", sendOTPError);
|
req.session.otp = otp;
|
||||||
res.status(500).send("Internal Server Error");
|
req.session.otpExpiration = expirationTime;
|
||||||
return;
|
req.session.save();
|
||||||
|
|
||||||
|
// Send OTP via email
|
||||||
|
try {
|
||||||
|
await sendOTPByEmail(user.email, otp);
|
||||||
|
// Log successful OTP sending
|
||||||
|
await logActivity(username, true, "OTP successfully sent to user");
|
||||||
|
} catch (sendOTPError) {
|
||||||
|
// Log unsuccessful OTP sending
|
||||||
|
await logActivity(username, false, "OTP failed to send to user");
|
||||||
|
console.error("Error sending OTP:", sendOTPError);
|
||||||
|
res.status(500).send("Internal Server Error");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Render OTP input page
|
||||||
|
res.render("otp", { error: null, username: user.username });
|
||||||
|
} else {
|
||||||
|
// Log unsuccessful login attempt
|
||||||
|
await logActivity(username, false, "Incorrect password");
|
||||||
|
res.render("login", { error: "Invalid username or password" });
|
||||||
}
|
}
|
||||||
|
|
||||||
// Render OTP input page
|
|
||||||
res.render("otp", { error: null, username: user.username });
|
|
||||||
} else {
|
} else {
|
||||||
// Log unsuccessful login attempt
|
// Log unsuccessful login attempt
|
||||||
await logActivity(username, false, "Incorrect password");
|
await logActivity(username, false, "User not found");
|
||||||
res.render("login", { error: "Invalid username or password" });
|
res.render("login", { error: "Invalid username or password" });
|
||||||
}
|
}
|
||||||
} else {
|
});
|
||||||
// Log unsuccessful login attempt
|
} catch (error) {
|
||||||
await logActivity(username, false, "User not found");
|
console.error("Error in login route:", error);
|
||||||
res.render("login", { error: "Invalid username or password" });
|
res.status(500).send("Internal Server Error");
|
||||||
}
|
}
|
||||||
});
|
|
||||||
} catch (error) {
|
|
||||||
console.error("Error in login route:", error);
|
|
||||||
res.status(500).send("Internal Server Error");
|
|
||||||
}
|
}
|
||||||
});
|
);
|
||||||
app.post("/verify-otp", async (req, res) => {
|
app.post("/verify-otp", async (req, res) => {
|
||||||
try {
|
try {
|
||||||
const enteredOTP = req.body.otp;
|
const enteredOTP = req.body.otp;
|
||||||
|
@ -94,11 +94,5 @@ button:hover {
|
|||||||
<p>If you have forgotten your password, please <span class="reset-link" onclick="location.href='/forgot-password'">reset here</span>.</p>
|
<p>If you have forgotten your password, please <span class="reset-link" onclick="location.href='/forgot-password'">reset here</span>.</p>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
<script>
|
|
||||||
// Function to escape HTML characters
|
|
||||||
function escapeHTML(str) {
|
|
||||||
return str.replace(/&/g, "&").replace(/</g, "<").replace(/>/g, ">").replace(/"/g, """).replace(/'/g, "'");
|
|
||||||
}
|
|
||||||
</script>
|
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
26
package-lock.json
generated
26
package-lock.json
generated
@ -293,13 +293,6 @@
|
|||||||
"integrity": "sha512-FveZTNuGw04cxlAiWbzi6zTAL/lhehaWbTtgluJh4/E95DqMwTmha3KZN1aAWA8cFIhHzMZUvLevkw5Rqk+tSQ==",
|
"integrity": "sha512-FveZTNuGw04cxlAiWbzi6zTAL/lhehaWbTtgluJh4/E95DqMwTmha3KZN1aAWA8cFIhHzMZUvLevkw5Rqk+tSQ==",
|
||||||
"requires": {
|
"requires": {
|
||||||
"safe-buffer": "5.2.1"
|
"safe-buffer": "5.2.1"
|
||||||
},
|
|
||||||
"dependencies": {
|
|
||||||
"safe-buffer": {
|
|
||||||
"version": "5.2.1",
|
|
||||||
"resolved": "https://registry.npmjs.org/safe-buffer/-/safe-buffer-5.2.1.tgz",
|
|
||||||
"integrity": "sha512-rp3So07KcdmmKbGvgaNxQSJr7bGVSVk5S9Eq1F+ppbRo70+YeaDxkw5Dd8NPN+GD6bjnYm2VuPuCXmpuYvmCXQ=="
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"content-type": {
|
"content-type": {
|
||||||
@ -498,11 +491,6 @@
|
|||||||
"iconv-lite": "0.4.24",
|
"iconv-lite": "0.4.24",
|
||||||
"unpipe": "1.0.0"
|
"unpipe": "1.0.0"
|
||||||
}
|
}
|
||||||
},
|
|
||||||
"safe-buffer": {
|
|
||||||
"version": "5.2.1",
|
|
||||||
"resolved": "https://registry.npmjs.org/safe-buffer/-/safe-buffer-5.2.1.tgz",
|
|
||||||
"integrity": "sha512-rp3So07KcdmmKbGvgaNxQSJr7bGVSVk5S9Eq1F+ppbRo70+YeaDxkw5Dd8NPN+GD6bjnYm2VuPuCXmpuYvmCXQ=="
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@ -546,6 +534,15 @@
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"express-validator": {
|
||||||
|
"version": "7.0.1",
|
||||||
|
"resolved": "https://registry.npmjs.org/express-validator/-/express-validator-7.0.1.tgz",
|
||||||
|
"integrity": "sha512-oB+z9QOzQIE8FnlINqyIFA8eIckahC6qc8KtqLdLJcU3/phVyuhXH3bA4qzcrhme+1RYaCSwrq+TlZ/kAKIARA==",
|
||||||
|
"requires": {
|
||||||
|
"lodash": "^4.17.21",
|
||||||
|
"validator": "^13.9.0"
|
||||||
|
}
|
||||||
|
},
|
||||||
"filelist": {
|
"filelist": {
|
||||||
"version": "1.0.4",
|
"version": "1.0.4",
|
||||||
"resolved": "https://registry.npmjs.org/filelist/-/filelist-1.0.4.tgz",
|
"resolved": "https://registry.npmjs.org/filelist/-/filelist-1.0.4.tgz",
|
||||||
@ -1207,6 +1204,11 @@
|
|||||||
"glob": "^7.1.3"
|
"glob": "^7.1.3"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"safe-buffer": {
|
||||||
|
"version": "5.2.1",
|
||||||
|
"resolved": "https://registry.npmjs.org/safe-buffer/-/safe-buffer-5.2.1.tgz",
|
||||||
|
"integrity": "sha512-rp3So07KcdmmKbGvgaNxQSJr7bGVSVk5S9Eq1F+ppbRo70+YeaDxkw5Dd8NPN+GD6bjnYm2VuPuCXmpuYvmCXQ=="
|
||||||
|
},
|
||||||
"safer-buffer": {
|
"safer-buffer": {
|
||||||
"version": "2.1.2",
|
"version": "2.1.2",
|
||||||
"resolved": "https://registry.npmjs.org/safer-buffer/-/safer-buffer-2.1.2.tgz",
|
"resolved": "https://registry.npmjs.org/safer-buffer/-/safer-buffer-2.1.2.tgz",
|
||||||
|
@ -23,6 +23,7 @@
|
|||||||
"ejs": "^3.1.9",
|
"ejs": "^3.1.9",
|
||||||
"express": "^4.18.2",
|
"express": "^4.18.2",
|
||||||
"express-session": "^1.17.3",
|
"express-session": "^1.17.3",
|
||||||
|
"express-validator": "^7.0.1",
|
||||||
"helmet": "^7.1.0",
|
"helmet": "^7.1.0",
|
||||||
"mqtt": "^5.3.3",
|
"mqtt": "^5.3.3",
|
||||||
"mysql2": "^3.6.5",
|
"mysql2": "^3.6.5",
|
||||||
|
Loading…
x
Reference in New Issue
Block a user