[midPoint] Security Advisory: Authorizations not applied properly to preview changes

Radovan Semancik radovan.semancik at evolveum.com
Tue Jul 30 15:14:37 CEST 2019


Date: 30 July 2019
Severity: Medium (CVSS 4.3)
Affected versions: all released midPoint versions
Fixed in versions: 4.0 (unreleased), 3.9.1 (unreleased)

Description

Authorizations not applied properly to the results of "preview changes" 
functionality.

Severity and Impact

In the "preview changes" screen user can see information that that user 
is not authorized to see. Authorizations are not properly applied to 
preview deltas. Therefore if user's actions results in a computed value 
such value is displayed in the "preview changes" even if user is not 
authorized to see it.

Mitigation

Users of affected MidPoint versions are advised to upgrade their 
deployments to the latest builds from the support branches. Users of 
midPoint 3.8 and earlier are advised to upgrade to midPoint 3.9.

As this is a medium severity issue, it is not forcing official 
maintenance releases of midPoint. The fix is provided in support branch 
for midPoint 3.9.x. The fix is *not* provided in support branches of 
midPoint 3.8.x and earlier due to a code incompatibility. Fix for 
midPoint 3.8.x and earlier will be provided on an explicit request of 
midPoint subscriber.

Discussion and Explanation

MidPoint provides "preview changes" functionality that can be used to 
see changes that are about to be executed before actual execution. This 
"preview" consists of several parts, e.g. the state of the objects 
before the change, state of the objects after the change, deltas that 
represent the change and so on. Authorizations were applied to the 
objects in the preview section, but the authorizations were not applied 
to the deltas. Therefore in case that user's change caused a different 
change in items that the user cannot see, that information may be leaked 
in the deltas.

The fix for this vulnerability was not provided for midPoint 3.8.x and 
earlier. The code has changed since the release of midPoint 3.8 and 
backport of the fix is not straightforward. As this is not a serious 
vulnerability and the impact is very limited, we have chosen to 
prioritize more serious issues and not spend development resource to fix 
this issue in an old code. Users of midPoint 3.8.x and earlier are 
advised to upgrade to midPoint 3.9. In a case that this vulnerability is 
considered to be a serious risk for midPoint subscribers running 3.8.x 
and 3.7.x that are not possible to upgrade, such subscribers are advised 
to contact Evolveum and request backport of this fix.

Credit

This issue was reported by Petr Gašparíkby the means of EU-Free and Open 
Source Software Auditing (EU-FOSSA2) project.

See Also

https://wiki.evolveum.com/display/midPoint/Security+Advisory%3A+Authorizations+not+applied+properly+to+preview+changes

-- 
Radovan Semancik
Software Architect
evolveum.com

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.evolveum.com/pipermail/midpoint/attachments/20190730/ee6308c6/attachment.htm>


More information about the midPoint mailing list