-
Notifications
You must be signed in to change notification settings - Fork 164
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security Bug with client api #1694
Comments
Thanks @MagicRedDeer, in src/pyasm/search/search.py when api_mode is open (default) the the check for access to security sensitive tables is skipped. @remkonoteboom I see you started brach 4.9 shuld I submit this PR to that branch too? |
Fix security bug, a normal user could query sensitive tables via API (see issue #1694)
It depends on where you want it fixed. If this is a critical security issue, then it should be in 4.8. If it can wait, then it should be in 4.9. I just started 4.9 because there is work being done that is at early stages (lots of collection updates). I will periodically merge 4.8 to 4.9 so you don't have to worry about that. |
Thanks Remko. |
Describe the bug
When a client connects to a tactic server using an api such as the
tactic_client_lib
python api. There is no security for 'admin' and/or 'sthpw' projects.For e.g. any user who can login to the tactic server without any credentials can query, insert and update
sthpw/ticket
,sthpw/login
, andsthpw/login_in_groups
and all other tables, many of which are sensitive to security.The discussion for this bug has been initiated here
To Reproduce
Steps to reproduce the behavior:
tactic_client_lib
sthpw/ticket
orsthpw/login
Expected behavior
The intended behavior of security for
tactic_client_lib
should be a matter of analysis and debate. But the following can be proposed.sthpw
tables from inside the projects where they have access according to the rules defined.The text was updated successfully, but these errors were encountered: