Skip to content
This repository has been archived by the owner on Apr 16, 2024. It is now read-only.

🐛 BUG: Severe CourseController information leak 🔥 #594

Closed
torss opened this issue Apr 7, 2018 · 2 comments · Fixed by #623
Closed

🐛 BUG: Severe CourseController information leak 🔥 #594

torss opened this issue Apr 7, 2018 · 2 comments · Fixed by #623
Assignees
Labels
api All Backend related Issues bug This Issue describes a unwanted behavior 🔒 security This directly pertains to geli's security!

Comments

@torss
Copy link
Collaborator

torss commented Apr 7, 2018

Unauthorized information for all courses is transmitted to any logged in user.
For example, anyone can easily read every course access key using only the built-in browser dev tools.
This is a severe issue and should be fixed ASAP.

Tested access key vulnerability on the staging system using Chrome 65 and confirmed the leak on the live system.

@torss torss added bug This Issue describes a unwanted behavior api All Backend related Issues labels Apr 7, 2018
@torss
Copy link
Collaborator Author

torss commented Apr 7, 2018

Note that there is a related TODO in CourseController.ts

TODO: Do not send lectures when student has no access

but no mention of the "accessKey" property in the "Success-Response" documentation, so I assume this leak issue is unknown.

There is also another TODO in the same file for the "PostCourseWhitelist" API:

TODO: Needs more security

This probably should get its own GitHub issue.

@torss torss self-assigned this Apr 12, 2018
@torss torss changed the title 🐛 BUG: Severe course information leak 🔥 🐛 BUG: Severe /api/courses/ information leak 🔥 Apr 13, 2018
@torss torss changed the title 🐛 BUG: Severe /api/courses/ information leak 🔥 🐛 BUG: Severe CourseController information leak 🔥 Apr 15, 2018
torss added a commit that referenced this issue Apr 15, 2018
PatrickSkowronek added a commit that referenced this issue Apr 15, 2018
Bugfix/#594 CourseController security flaws
@d89
Copy link
Collaborator

d89 commented Apr 18, 2018

You would need to present how you fixed it and how it was possible beforehand to sneak the key. I'd say it looks good for now 👍

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
api All Backend related Issues bug This Issue describes a unwanted behavior 🔒 security This directly pertains to geli's security!
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants