Bug 2055018

Summary: Users cannot disable HTTP OPTIONS method
Product: Red Hat Satellite Reporter: Jayant Bhatia <jbhatia>
Component: InstallerAssignee: satellite6-bugs <satellite6-bugs>
Status: NEW --- QA Contact: Satellite QE Team <sat-qe-bz-list>
Severity: medium Docs Contact:
Priority: medium    
Version: 6.10.0CC: ehelms, gpayelka, gtalreja
Target Milestone: UnspecifiedKeywords: Reopened, Triaged
Target Release: Unused   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-04-06 17:10:05 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Jayant Bhatia 2022-02-16 08:26:28 UTC
Description of problem:

The HTTP Options method is not disabled on Satellite-7 by default.

[root@dhcp130-199 httpd]# grep -irn "<Location" ./
./conf.d/05-foreman-ssl.d/katello.conf:1:<LocationMatch /rhsm|/katello/api>
./conf.d/05-foreman.conf:40:  <Location "/pulp/isos">
./conf.d/05-foreman.conf:47:  <Location "/pulp/repos">
./conf.d/05-foreman.conf:55:<Location /pub>
./conf.d/05-foreman.conf:63:  <Location "/pulp/content">
./conf.d/05-foreman.conf:121:<LocationMatch "^/(assets|webpack)">
./conf.d/05-foreman-ssl.conf:46:  <Location "/pulpcore_registry/v2/">
./conf.d/05-foreman-ssl.conf:56:  <Location "/pulp/isos">
./conf.d/05-foreman-ssl.conf:63:  <Location "/pulp/repos">
./conf.d/05-foreman-ssl.conf:71:<Location /pub>
./conf.d/05-foreman-ssl.conf:79:  <Location "/pulp/content">
./conf.d/05-foreman-ssl.conf:86:  <Location "/pulp/api/v3">
./conf.d/05-foreman-ssl.conf:158:<LocationMatch "^/(assets|webpack)">



[root@dhcp130-199 ~]# curl -k -I -X OPTIONS http://dhcp130-199.gsslab.pnq2.redhat.com/pulp
HTTP/1.1 200 OK
Date: Wed, 16 Feb 2022 08:11:26 GMT
Server: Apache
Allow: OPTIONS,HEAD,GET,POST
Content-Length: 0

# curl -k -I -X OPTIONS http://dhcp130-199.gsslab.pnq2.redhat.com/pulp/api/v3
HTTP/1.1 200 OK
Date: Wed, 16 Feb 2022 08:26:10 GMT
Server: Apache
Allow: OPTIONS,HEAD,GET,POST
Content-Length: 0



Expected results: The above command should return '403 Forbidden'.

Comment 1 Brad Buckingham 2022-02-21 14:51:13 UTC
Is this a regression in behavior from Satellite 6.10?

Comment 2 Jayant Bhatia 2022-02-23 04:56:13 UTC
Hello,

Below is the output of same commands from Satellite 610.

[root@rhsat610 ~]# curl -k -I -X OPTIONS http://rhsat610.syslab.pnq2.redhat.com/pulp
HTTP/1.1 200 OK
Date: Wed, 23 Feb 2022 04:55:16 GMT
Server: Apache
Allow: OPTIONS,GET,HEAD,POST
Content-Length: 0

[root@rhsat610 ~]# curl -k -I -X OPTIONS http://rhsat610.syslab.pnq2.redhat.com/pulp/api/v3
HTTP/1.1 200 OK
Date: Wed, 23 Feb 2022 04:55:26 GMT
Server: Apache
Allow: OPTIONS,GET,HEAD,POST
Content-Length: 0

Comment 3 Eric Helms 2022-05-10 18:40:01 UTC
Can you expand on why OPTIONS needs to be disabled by default?

Comment 4 Jayant Bhatia 2022-05-12 04:46:08 UTC
Please refer following : https://access.redhat.com/solutions/4963161

Comment 5 Brad Buckingham 2023-03-06 11:40:19 UTC
Upon review of our valid but aging backlog the Satellite Team has concluded that this Bugzilla does not meet the criteria for a resolution in the near term, and are planning to close in a month. This message may be a repeat of a previous update and the bug is again being considered to be closed. If you have any concerns about this, please contact your Red Hat Account team.  Thank you.

Comment 6 Brad Buckingham 2023-04-06 17:10:05 UTC
Thank you for your interest in Red Hat Satellite. We have evaluated this request, and while we recognize that it is a valid request, we do not expect this to be implemented in the product in the foreseeable future. This is due to other priorities for the product, and not a reflection on the request itself. We are therefore closing this out as WONTFIX. If you have any concerns about this feel free to contact your Red Hat Account Team. Thank you.

Comment 7 Eric Helms 2023-07-27 13:58:17 UTC
*** Bug 2226911 has been marked as a duplicate of this bug. ***

Comment 8 Eric Helms 2023-07-27 14:00:36 UTC
I've re-opened this because there is a KCS article (https://access.redhat.com/solutions/4963161) that instructs users to use an unsupported method to achieve this which can break between releases.