From: jake%acutex.net <> Date: Sat, 2 Jun 2001 21:24:45 +0000 (+0000) Subject: sanitycheck.cgi was able to be run by anybody - even people without Bugzilla accounts... X-Git-Tag: bugzilla-2.14~104 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=b42289bb5c84bff0bc610c8d3d87b63e4246a240;p=thirdparty%2Fbugzilla.git sanitycheck.cgi was able to be run by anybody - even people without Bugzilla accounts. It is now restricted to only people with the editbugs permission (bug 54556). Patch by Myk Melez r= jake@acutex.net --- diff --git a/sanitycheck.cgi b/sanitycheck.cgi index 2da7fde2fd..bc3b823c7a 100755 --- a/sanitycheck.cgi +++ b/sanitycheck.cgi @@ -27,10 +27,25 @@ require "CGI.pl"; use vars %::FORM; +ConnectToDatabase(); + +confirm_login(); + +# Make sure the user is authorized to access sanitycheck.cgi. Access +# is restricted to logged-in users who have "editbugs" privileges, +# which is a reasonable compromise between allowing all users to access +# the script (creating the potential for denial of service attacks) +# and restricting access to this installation's administrators (which +# prevents users with a legitimate interest in Bugzilla integrity +# from accessing the script). +UserInGroup("editbugs") + || DisplayError("You are not authorized to access this script, + which is reserved for users with the ability to edit bugs.") + && exit; + print "Content-type: text/html\n"; print "\n"; -ConnectToDatabase(); SendSQL("set SQL_BIG_TABLES=1"); my $offervotecacherebuild = 0;