Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Some New Endpoints Return Sensitive Data - Should Require Auth #871

Closed
krowvin opened this issue Sep 6, 2024 · 6 comments · Fixed by #872 or #882
Closed

Some New Endpoints Return Sensitive Data - Should Require Auth #871

krowvin opened this issue Sep 6, 2024 · 6 comments · Fixed by #872 or #882
Assignees
Labels
approved-W192HQ23F0232-task4 Only valid if set by MikeNeilson, DanielO, CharlesG priority:high Security Issue related to security in some way

Comments

@krowvin
Copy link
Collaborator

krowvin commented Sep 6, 2024

The following are endpoints that I tested and that, for some reason or another (REGI?), have IP address/User Information/Hostnames in them.

Would the best method be to force authentication of these GET requests?

Project Lock Rights Endpoint

Command

curl -X 'GET' \  'https://T7HOST:TCPORT/swt-data/project-lock-rights?office-mask=SWT' \  -H 'accept: application/json'

Result

Having a user in REGI create a lock, then running that to see the output gives this

[
  {
    "office-id": "SWT",
    "project-id": "ALTU",
    "application-id": "regi;daily ops",
    "acquire-time": 1725640446000,
    "session-user": "<USERNAME REDACTED>",
    "os-user": "<USERNAME REDACTED>",
    "session-program": "JDBC Thin Client",
    "session-machine": "<SYSTEM HOSTNAME REDACTED>"
  }
]

Project Lock Revoker Rights Endpoint

Command

curl -X 'GET' \
  'https://T7HOST:TCPORT/swt-data/project-lock-rights?office-mask=SWT' \
  -H 'accept: application/json'

Result

[
{
  "office-id": "SWT",
  "project-id": "BIGH",
  "application-id": "regi",
  "user-id": "<REDACTED USERID 1>"
},
{
  "office-id": "SWT",
  "project-id": "WAUR",
  "application-id": "regi",
  "user-id": "<REDACTED USERID 2>"
},
...
]
@krowvin krowvin added the Security Issue related to security in some way label Sep 6, 2024
@MikeNeilson MikeNeilson added hec-approved-W912HQ21F0163-4b Indicator to staff on specific, awarded, contract that work/billing is allowed. approved-W192HQ23F0232-task4 Only valid if set by MikeNeilson, DanielO, CharlesG priority:high and removed hec-approved-W912HQ21F0163-4b Indicator to staff on specific, awarded, contract that work/billing is allowed. labels Sep 6, 2024
@rma-rripken
Copy link
Collaborator

#872

Its possible there is still a place or two. I'm checking

@rma-rripken
Copy link
Collaborator

oh, right. the IT will need the auth added too

@rma-psmorris
Copy link
Collaborator

Auth added by Ryan to this endpoint. Other concerns as follows:
Future addition of the MQ pieces might have sensitive data.
Get endpoints to properties, CLOB, and BLOB could have auth added given their usage to store application level data. @MikeNeilson do you have thoughts here?

@MikeNeilson
Copy link
Contributor

MQ would be authorized only; unless a compelling argument is made otherwise. But even then the scope of data would be limited.

CLOB/BLOB. fair point. Will require further consideration.

@MikeNeilson
Copy link
Contributor

Though it dawns on me that properties, and probably water supply, and honestly most of the "REGI" derived endpoints should be authorized even for read. Charles also found some hostnames in the properties that we assume were stored by REGI, but it also makes sense that that particular properties endpoint isn't for public consumption.

@adamkorynta
Copy link
Collaborator

Project lock endpoints and properties were merged under the attached PR's. Closing this issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved-W192HQ23F0232-task4 Only valid if set by MikeNeilson, DanielO, CharlesG priority:high Security Issue related to security in some way
Projects
None yet
5 participants