-
-
Notifications
You must be signed in to change notification settings - Fork 423
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[16.0][FIX] users_ldap_groups JSON RPC vulnerability #659
Conversation
res.company.ldap.operator operators should be private methods; public methods allow arbitrary LDAP queries via JSON-API
Please do a responsible disclosure of any vulnerability. You can't put |
Yes, and that was also a non responsible disclosure. It's not your fault though, as there's no mechanism established for this at OCA (cc @vdewulf), as there's for Odoo: https://www.odoo.com/es_ES/security-report |
I agree. Well, https://odoo-community.org/contactus does have security contact information, but the information is a few clicks away from the repository and, therefore, slightly hard to find. Now that I have it, I'll definitely approach the security team first in the future. |
Good point, @oh2fih. I added a security policy on our GitHub organization. It is now visible on each repo. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
minor remark
Co-authored-by: Hpar <[email protected]>
Let's merge it although the CI is red. |
I opened backport prs for 15, 14, 13. 12 will require manual invervention. |
Fix #617
res.company.ldap.operator operators should be private methods; public methods allow arbitrary LDAP queries via JSON-API