]> git.ipfire.org Git - thirdparty/bugzilla.git/commitdiff
Bug 91761: sanitycheck.cgi is too broadly accessible - Patch by Frédéric Buclin...
authorlpsolit%gmail.com <>
Fri, 22 Dec 2006 04:47:23 +0000 (04:47 +0000)
committerlpsolit%gmail.com <>
Fri, 22 Dec 2006 04:47:23 +0000 (04:47 +0000)
sanitycheck.cgi

index 5b6832fade9aff1e6883dd376cb350b57071d70b..0291a34be8469dd3d502df12e7863e92b95f654d 100755 (executable)
@@ -78,15 +78,11 @@ my $cgi = Bugzilla->cgi;
 my $dbh = Bugzilla->dbh;
 my $template = Bugzilla->template;
 
-# Make sure the user is authorized to access sanitycheck.cgi.  Access
-# is restricted to logged-in users who have "editbugs" privileges,
-# which is a reasonable compromise between allowing all users to access
-# the script (creating the potential for denial of service attacks)
-# and restricting access to this installation's administrators (which
-# prevents users with a legitimate interest in Bugzilla integrity
-# from accessing the script).
-UserInGroup("editbugs")
-  || ThrowUserError("auth_failure", {group  => "editbugs",
+# Make sure the user is authorized to access sanitycheck.cgi.
+# As this script can now alter the group_control_map table, we no longer
+# let users with editbugs privs run it anymore.
+UserInGroup("editcomponents")
+  || ThrowUserError("auth_failure", {group  => "editcomponents",
                                      action => "run",
                                      object => "sanity_check"});