Commit Graph

18 Commits (4fea371c4b417e6eac5cdefe0baf77840f5752a1)

Author SHA1 Message Date
William Robinet 4fea371c4b Fix permissions 2016-02-11 17:03:51 +01:00
iglocska cd3096a38f Fixed a security issue with the regular expressions
- as discovered and reported by Egidio Romano of Minded Security

- Users with the perm_regex permissions could create a malicious regex that leads to RCE using the PHP /e modifier for preg_replace().
- Regular expressions are now sanitised on edit / creation of the malicious modifier

- also added an admin tool that lets admins clean their current set of regexes of the harmful modifier
2015-11-16 19:47:31 +01:00
iglocska afdcc1af0c Fixed a security issue with the CSRF protection being avoidable using some site admin functionality
- as discovered and reported by Egidio Romano of Minded Security

- Lacking checks of HTTP methods in some functionality could lead to a site admin uploading and executing malicious scripts

- Tightened HTTP method verification across the board for actions that modify data
- Turned some administrative tasks to POST only actions
2015-11-13 23:57:03 +01:00
Iglocska ff01eebf70 Added the same functionality to the regex edit 2015-07-27 08:26:01 +02:00
Iglocska 0874faa991 Added error message if regex is added without choosing a type, fixes #575
- user will be taken back to the form if no type selected
2015-07-27 08:13:20 +02:00
iglocska d27ddee207 First rework of the siteadmin role
- ADMIN org removed.

- Siteadmins are now identified by the perm_site_admin flag

- Siteadmins can now be of any organisation

- editing the regexp / whitelist rules can now be done by a special user with the perm_regexp_access in his/her role

- Executing a mass replace of attribute values based on the regexp rules cannot be initiated by a regexp/whitelist user, only by a site admin

- If the login page is reached without any users / roles defined they are automatically created (perviously it was only the user that was created)

- Org admins are restricted from assigning perm_site_admin, perm_sync and perm_regexp_access roles to users. This can only be done by a site admin.
2013-10-03 11:45:27 +02:00
iglocska 7c04a116ac First refactoring of the regexp 2013-07-11 13:43:36 +02:00
iglocska 0104f7956b Continued rework of the regexp
- Regular expressions are now only checked for attributes

- Regular expressions are now defined and checked on a type by type
basis, with the setting "ALL" affecting all attributes

- creation / deletion of several attributes in one edit to accommodate
for several checked type options

- perform on all admin option now only saves attributes that actually
get changed by the regexp, making the function usable again for larger
databases

- Some feedback on what got changed during a perform on all

- UI changes in the index / regexp add / edit views to reflect the type
sensitivity changes
2013-07-08 17:15:04 +02:00
iglocska eeac31bee8 Regexp changes, UI changes
- first cleanup of regexp

- some changes left off from the UI changes that were not in the views
themselves
2013-07-04 15:45:11 +02:00
Andras Iklody 0eec208b45 Further changes to the authorisation 2013-04-26 15:46:39 +02:00
Andras Iklody eeaa071024 Removal of the remains of the old authorization / adding new ones where
needed
2013-04-26 14:43:44 +02:00
Christophe Vandeplas 8a74635e3a fix sanitization in Regexp #96 2013-04-24 15:33:22 +02:00
Andras Iklody 29295e1380 changes to the admin org access and sanitization
1. Some errors fixed in the way redirects worked for org admins

2. fixed some double sanitization resulting in incorrect characters
displayed in certain fields
2013-01-30 11:49:55 +01:00
Noud de Brouwer 9d9dd7b4af coding standards
Coding Standards.
2013-01-28 11:05:23 +00:00
Andras Iklody 504599fbcc Org admin privileges
Added restrictions for org admins and regular users to be able to see
regexp/whitelist/blacklist information without being able to edit them.
Org admins can also see the roles but not edit them.
2013-01-28 11:44:09 +01:00
Noud de Brouwer c7a98aa286 AdminCrud
use of the AdminCrud component.
2013-01-04 14:49:52 +00:00
Noud de Brouwer ca290b0357 Import Regexp
removed unused code.
2012-12-20 18:56:04 +00:00
Noud de Brouwer 1e518f8bc0 Import Regexp
Renamed Import Whitelist to Import Regexp.
2012-12-20 18:47:38 +00:00