Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prevent authorized access to hashed user password, cachepwd, salt, and sessionid [SEC-3837] #15678

Merged
merged 1 commit into from Apr 16, 2021

Conversation

Mark-H
Copy link
Collaborator

@Mark-H Mark-H commented Apr 16, 2021

What does it do?

This addresses a variety of different ways a manager user with permission to manage users might be able to access hashed passwords, the cachepwd, or a users' last sessionid. Follows from report by Solar Security who reported it was included in the security/group/user/getList response, after which I did some more searching and found a few more places that could return some of these.

Why is it needed?

This is not super interesting from a security perspective, as passwords are hashed and any user that has permission to manage users could change their password and just take over an account that way. But as these fields are not supposed to be readable, good to lock 'm down anyway.

How to test

Perform the actions and confirm there is no sensitive data in the raw response.

Related issue(s)/PR(s)

https://community.modx.com/t/new-security-issues-reported-all-in-one-report/3837

… [SEC-3837]

This addresses a variety of different ways a manager user with permission to manage users might be able to access hashed passwords, the cachepwd, or a users' last sessionid. Follows from report by Solar Security who reported it was included in the security/group/user/getList response, after which I did some more searching and found a few more places that could return some of these.

This is not super interesting from a security perspective, as any user that has permission to manage users could change their password and just take over an account that way. But as these fields are not supposed to be readable, it's good to lock 'm down anyway.
@Mark-H Mark-H added area-security urgent The issue requires attention and has higher priority over others. pr/review-needed Pull request requires review and testing. pr/port-to-3 Pull request has to be ported to 3.x. labels Apr 16, 2021
@Mark-H Mark-H added this to the v2.8.2 milestone Apr 16, 2021
@Mark-H Mark-H requested a review from opengeek as a code owner April 16, 2021 14:55
@cla-bot cla-bot bot added the cla-signed CLA confirmed for contributors to this PR. label Apr 16, 2021
@opengeek opengeek merged commit 04d6363 into modxcms:2.x Apr 16, 2021
@opengeek opengeek removed the pr/review-needed Pull request requires review and testing. label Apr 16, 2021
@Mark-H Mark-H deleted the security-userpwds branch April 30, 2021 14:02
Mark-H added a commit to Mark-H/revolution that referenced this pull request Oct 19, 2021
@Mark-H
Copy link
Collaborator Author

Mark-H commented Oct 19, 2021

Ported to 3.x in #15843

@Mark-H Mark-H removed the pr/port-to-3 Pull request has to be ported to 3.x. label Oct 19, 2021
Mark-H added a commit to Mark-H/revolution that referenced this pull request Oct 20, 2021
opengeek added a commit that referenced this pull request Oct 20, 2021
* Port security fixes from #15720 (several reflected XSS vulnerabilities) to 3.x

* Port #15678 to 3.x: prevent unauthorized access to user information

* Port #15643 to 3.x: prevent editing or removing of files with an extension that's not allowed

* Port #15280 to 3.x: prevent stored XSS in resource list tv

* Port #15273 to 3.x: fix various stored XSS vulnerabilities related to users and the media browser

* Fix accidental merge artifect

* grunt build

Co-authored-by: Jason Coward <jason@opengeek.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area-security cla-signed CLA confirmed for contributors to this PR. urgent The issue requires attention and has higher priority over others.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants