-
Notifications
You must be signed in to change notification settings - Fork 466
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
UVE: 🐛 Prevent Read-Only Token Access to Working Content #30991
Comments
I have been testing different users with “read-only” tokens, and the 401 response is not necessarily expected. Next, take a user created from scratch, assign only the back-end role, and grant “view” permissions for the site of interest. If you use the token immediately, you’ll get a 401. However, if you apply the changes in cascade, the token will now allow access to pages, and permissions should apply for filtering. That said, I encountered a bug when filtering content in the “working” state. The issue arises because the construction of one of the objects used for filtering is taking the system user instead of the logged-in user. |
These fixes were merged as part of the branch #31072 therefore it can be tested and no additional merge is required |
Problem Statement
Read-only API tokens are incorrectly allowed to access the working content of pages with future date set in the Page API, violating access control policies and potentially exposing unpublished content prematurely.
Objectives
User Story
As an IT Security staff member, I want to ensure that read-only tokens can only access live content and not any working versions, so we can maintain content integrity and adhere to strict access policies.
Steps to reproduce
publishDate
in the future to see the content and a read only tokenAcceptance Criteria
External Links
[Placeholder for external links to Slack conversations, support tickets, Figma designs, etc.]
Assumptions & Initiation Needs
Quality Assurance Notes & Workarounds
[Placeholder for QA notes]
Technical Details
The API needs adjustments particularly in how permissions are verified for future-dated content requests.
Potential Challenges
Impact on Existing Features
Ensure that permission checks do not negatively impact legitimate user accesses or API response times.
The text was updated successfully, but these errors were encountered: