Skip to content

A problem where information can be read even though read permissions have not been granted. #13543

@penM000

Description

@penM000

NetBox version

v3.5.5

Python version

3.10

Steps to Reproduce

  1. Create a user (in this case, test) who has not been granted any access rights. When he logs in, he will not be able to see the dashboard or anything else.
    image
  2. Grant read permission to this user by assigning him to a group. Here, we grant all read permissions to DCIM.
cable, cable path, console port, console port template, console server port, console server port template, device, device bay, device bay template, device role, device type, front port, front port template, interface, interface template, inventory item, location, manufacturer, platform, power feed, power outlet, power outlet template, power panel, power port, power port template, rack, rack reservation, rack role, rear port, rear port template, region, site, site group, virtual chassis, module type, module bay, module, module bay template, inventory item role, inventory item template, cable termination, virtual device context
  1. Reload the page after granting, and some items will become viewable.
    image

  2. Open the appropriate device. The "Config Context" permission is not granted, so it is not shown in the tab.
    image

  3. Add "config-context/" to the current URL. In the image example, "https://netbox/dcim/devices/3009/config-context/"
    image
    image

6.Check the api page. You will see the "Config Context" section.
image

7.I do not have access to "https://netbox/extras/config-contexts/".
image

Expected Behavior

If you hit the URL directly, expect to see "You do not have permission to access this page.
We also expect that the API will not display any information that you do not have permission to access.

Observed Behavior

Users who do not have permissions to read the "Config Context" behave in such a way that the corresponding page and the "Config Context" of the "Device" are hidden.
However, in reality, this is visible by directly hitting the API or URL.
We believe this is a bug that allows users to read the "Config Context" information even though they do not have read permission.

Metadata

Metadata

Assignees

Labels

severity: lowDoes not significantly disrupt application functionality, or a workaround is availablestatus: acceptedThis issue has been accepted for implementationtype: bugA confirmed report of unexpected behavior in the application

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions