From: lpsolit%gmail.com <> Date: Fri, 22 Dec 2006 04:47:23 +0000 (+0000) Subject: Bug 91761: sanitycheck.cgi is too broadly accessible - Patch by Frédéric Buclin... X-Git-Tag: bugzilla-2.22.2~13 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=9b8c318ce2a10289711ec120e6149442aa4e6541;p=thirdparty%2Fbugzilla.git Bug 91761: sanitycheck.cgi is too broadly accessible - Patch by Frédéric Buclin r/a=justdave --- diff --git a/sanitycheck.cgi b/sanitycheck.cgi index 5b6832fade..0291a34be8 100755 --- a/sanitycheck.cgi +++ b/sanitycheck.cgi @@ -78,15 +78,11 @@ my $cgi = Bugzilla->cgi; my $dbh = Bugzilla->dbh; my $template = Bugzilla->template; -# Make sure the user is authorized to access sanitycheck.cgi. Access -# is restricted to logged-in users who have "editbugs" privileges, -# which is a reasonable compromise between allowing all users to access -# the script (creating the potential for denial of service attacks) -# and restricting access to this installation's administrators (which -# prevents users with a legitimate interest in Bugzilla integrity -# from accessing the script). -UserInGroup("editbugs") - || ThrowUserError("auth_failure", {group => "editbugs", +# Make sure the user is authorized to access sanitycheck.cgi. +# As this script can now alter the group_control_map table, we no longer +# let users with editbugs privs run it anymore. +UserInGroup("editcomponents") + || ThrowUserError("auth_failure", {group => "editcomponents", action => "run", object => "sanity_check"});