Opened 13 years ago
Last modified 9 years ago
#30 new task
Security review (ongoing)
Reported by: | Kris Deugau | Owned by: | |
---|---|---|---|
Priority: | major | Milestone: | |
Version: | Keywords: | ||
Cc: |
Description (last modified by )
XSS/input validation:
Reading back on VegaDNS' history I poked into the CVE issues reported with VegaDNS 0.9.9.1 and 1.1.4. I realized the same message-reporting vulnerability would bite here.
Access scoping:
Check to make sure a user can't access any entity outside of their group tree
Change History (16)
comment:1 by , 13 years ago
comment:2 by , 13 years ago
comment:3 by , 13 years ago
(In [176]) /trunk
Remove some more stale commented code
Remove redundant call to initialze $searchsubs
Security review (see #30)
- set $webvar{page} a little earlier so we don't clutter the session with unusable data
- tweak initialization of $searchsubs. Improved but will still behave a bit strangely if extra data is deliberately or accidentally added to $webvar{searchsubs} (see #31)
comment:4 by , 13 years ago
comment:5 by , 13 years ago
comment:6 by , 13 years ago
Description: | modified (diff) |
---|---|
Summary: | Security review - XSS/input validation → Security review |
Change ticket info to cover all security-review changes
comment:7 by , 13 years ago
(In [179]) /trunk
Fix up ACL and scope checks on groups (see #30)
- check correct ACL permission for group creation
- check parent group of a new group is in-scope for user
- make sure new groups do not exceed the ACL given to the user
- normalize action reporting (success and warning) compared to the same actions elsewhere
- check scope deleting a group
- check scope editing a group
comment:8 by , 13 years ago
comment:9 by , 13 years ago
comment:10 by , 13 years ago
comment:12 by , 13 years ago
Summary: | Security review → Security review (ongoing) |
---|---|
Type: | defect → task |
comment:13 by , 12 years ago
comment:14 by , 11 years ago
(In [591]) /trunk
- Session-handling tweak; set cookies to expire so use of the Back button doesn't result in read-only access to everything.
- Fiddle group handling in session data and on constructing URLs; side effects possibly related to the session issue caused a user in a subgroup to get mistakenly fed data for the root group - except for the group list in the menu. Arguably security fixes; see #30.
comment:15 by , 11 years ago
(In [592]) /trunk
Review, fix, tweak, and fine-tune user permission add/update handling.
Confirm that it now correctly limits a user to granting only those
permissions they already hold, and only warns when the requested
permissions are really greater or mismatched.
Also catch a possible malicious escalation to superuser/admin status.
Confirm it *should* be impossible to generate this warning via normal
web UI actions; someone would have to manually construct a URL or POST
request with the appropriate fields.
See #30.
(In [173]) /trunk