To be more precise, I am currently facing this issue when trying to
implement http://jira.xwiki.org/browse/XWIKI-11416 and I need to remove the
PR check in the wiki script service to be able to edit wiki descriptors in
a subwiki, hopefully without unwanted security holes.

Thanks,
Eduard

On Fri, Dec 12, 2014 at 4:47 PM, Eduard Moraru <[email protected]> wrote:

> Hi devs,
>
> We are all waiting for signed scripts to come to the rescue, but until
> then, we have pretty much agreed that it is a good idea to remove PR
> checks, which don`t work in subwikis (see activity stream [1], wikis module
> [2], etc.)
>
> However, once we do that, we open up a big security problem, such as "trap
> pages". These are basically documents containing malicious usage of our
> services, that are written by regular users and that are waiting (or
> tricking) for admins (or users with privileges) to access them by mistake.
> Since those script services will be looking only at the current user's
> rights, they will be executing the malicious code and the security will be
> compromised.
>
> What options do we have here?
>
> On some modules (like the wiki module) it might be useful to check the
> context security document (sdoc) and see if its author is an admin (of the
> wiki descriptor that is being saved) or a global admin, thus replacing a PR
> check on the current document with an "admin check on the current document".
>
> Using sdoc instead of just doc avoids attempts of using proxy documents
> (e.g. default ones like /bin/view/someDocument?sheet=SomeBadDocument or
> custom ones created by the usage of the display or include macros), but
> unfortunately that is not set by default by XWiki's actions and is only
> available in a handful of locations, meaning we can not rely on sdoc.
>
>
> A mechanism similar to CSRF protection API but for script services to
> confirm that the user really intended to execute them might be another
> idea, but I`m not sure how that might be implemented without allowing easy
> bypass by directly providing the challenge result. CAPTCHA for sensitive
> script services? :) That might be too extreme and completely ruin the UX.
>
> Any ideas?
>
> Thanks,
> Eduard
>
> ----------
> [1] http://jira.xwiki.org/browse/XWIKI-10446
> [2] http://jira.xwiki.org/browse/XWIKI-11416
>
_______________________________________________
devs mailing list
[email protected]
http://lists.xwiki.org/mailman/listinfo/devs

Reply via email to