Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix possible information disclosure within filter api #351

Merged
merged 1 commit into from Sep 28, 2014
Merged

Fix possible information disclosure within filter api #351

merged 1 commit into from Sep 28, 2014

Conversation

grangeway
Copy link
Contributor

This fixes visibility of bugs within filter api for users who have
different roles in different projects.

if( access_has_project_level( $t_access_required_to_view_private_bugs, $t_pid, $t_user_id ) ) {
$t_private_and_public_project_ids[] = $t_pid;
# limit reporters to visible projects
if( ( ON === $t_limit_reporters ) && ( !access_has_project_level( REPORTER + 1, $t_pid, $t_user_id ) ) ) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm wondering if REPORTER shouldn't actually be config_get( 'report_bug_threshold' )

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For the purposes of this, i'm going to go with 'no'.. however, will submit a PR for us to evaluate whether to move away from using REPORTER like this.

@dregad
Copy link
Member

dregad commented Sep 24, 2014

Do we need a CVE for this exposure (looks like CWE-200)?

@grangeway
Copy link
Contributor Author

hmm, I wrote on a comment on this before:

In terms of CVE, I'm thinking not - or well: to disclose the any information on a bug, you'd need to be a manager in one project for instance, and a reporter in another project on the same instance.

The danger if you start treating these sort of things as needing CVE's, we'd have to evaluate whether any config_get -> config_get($t_bug->project) we've made, would require the same treatment.

So for example, lets take the SOAP api for one moment:

We allow enum strings to be set per-project.
The soap api doesn't allow a project to be specified when getting an enum string
Therefore, depending on setup, the SOAP api could allow someone to get access to a list of custom fields for instance, that they would not normally be able to see from the front end interface of mantis.

... and whilst I think these sort of things do need fixing, i'm not sure we really want to be generating a CVE for each one.

This fixes visibility of bugs within filter api for users who have
different roles in different projects.
@dregad
Copy link
Member

dregad commented Sep 29, 2014

i'm not sure we really want to be generating a CVE for each one.

OK, fair enough

@grangeway
Copy link
Contributor Author

We do however need to review use of config_get() for projects which is on
my list to do in a week or so time

On Mon, Sep 29, 2014 at 9:45 AM, Damien Regad notifications@github.com
wrote:

i'm not sure we really want to be generating a CVE for each one.

OK, fair enough


Reply to this email directly or view it on GitHub
#351 (comment).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
3 participants