Bug 733420 - User permission check missing for CryptoKeysHandler
Summary: User permission check missing for CryptoKeysHandler
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Satellite 5
Classification: Red Hat
Component: API
Version: 540
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Tomáš Kašpárek
QA Contact: Martin Minar
URL:
Whiteboard:
Depends On:
Blocks: sat560-lowbug
TreeView+ depends on / blocked
 
Reported: 2011-08-25 16:43 UTC by Tomas Lestach
Modified: 2016-07-04 00:56 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-10-01 21:56:42 UTC


Attachments (Terms of Use)

Description Tomas Lestach 2011-08-25 16:43:00 UTC
Description of problem:
Nowadays any user may create or delete keys using the kickstart.keys APIs.

Version-Release number of selected component (if applicable):
sat541

How reproducible:
always

Steps to Reproduce:
1. Create a simple satellite user.
2. Try to create and delete a GPG a/o SSL key using kickstart.keys API
  
Actual results:
Passed.

Expected results:
Only an org or config admin shall be able to modify GPG/SSL keys (at least there's such restriction in WebUI)

Comment 1 Tomas Lestach 2011-08-25 17:48:27 UTC
Tomas, please fix also cases, when specifying invalid description for delete and getDetails (NoSuchCryptoKeyException)

Comment 2 Tomáš Kašpárek 2012-08-28 11:58:27 UTC
fixed in spacewalk master 1dae339f2c4ef314436bddc3bf9364dbf526bacd

Comment 5 Clifford Perry 2013-10-01 21:56:42 UTC
Satellite 5.6 has been released. This bug was tracked under the release.  

This bug was either VERIFIED or RELEASE_PENDING (re-verified prior shortly
before release). 

Moving to CLOSED CURRENT_RELEASE. 

Text from Upgrade Erratum follows:

Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHEA-2013-1395.html


Note You need to log in before you can comment on or make changes to this bug.