Project

General

Profile

Actions

Bug #2863

closed

CVE-2013-4182 - Privileges escalation via API

Added by Marek Hulán over 11 years ago. Updated over 11 years ago.

Status:
Closed
Priority:
Normal
Assignee:
Category:
Security
Target version:
Difficulty:
Triaged:
Fixed in Releases:
Found in Releases:

Description

Daniel Lobato discovered that /api/hosts/<name> does not check whether a current user has a privileges to display particular host.

This is caused by using generic #find_resource in hosts controller instead of limiting it via .my_hosts scope as it's in non-API controller. Since similar bug could be in any other API controller, I'll go over all API controllers and try to find other possible issues.

EDIT: hosts seems to be only object that has customized privileges system


Files

hosts_escalation.patch hosts_escalation.patch 538 Bytes Marek Hulán, 07/30/2013 10:44 AM
hosts_escalation.patch hosts_escalation.patch 2.75 KB tests not working, just for partial review Marek Hulán, 07/31/2013 11:04 AM
hosts_escalation.patch hosts_escalation.patch 4.59 KB Marek Hulán, 08/01/2013 03:03 AM
hosts_escalation.patch hosts_escalation.patch 10 KB Marek Hulán, 08/02/2013 05:01 AM
hosts_escalation.patch hosts_escalation.patch 14.6 KB final version with fixed tests that depends on all fixtures Marek Hulán, 08/02/2013 09:05 AM
0001-fixes-2863-restrict-APIs-1.2-stable.patch 0001-fixes-2863-restrict-APIs-1.2-stable.patch 15.9 KB final rebased for 1.2-stable Dominic Cleal, 08/19/2013 12:37 PM
0001-fixes-2863-restrict-APIs-1.2.0.patch 0001-fixes-2863-restrict-APIs-1.2.0.patch 15.9 KB final rebased for 1.2.0 Dominic Cleal, 08/19/2013 12:37 PM
Actions

Also available in: Atom PDF