Note: This bug is displayed in read-only format because
the product is no longer active in Red Hat Bugzilla.
Red Hat Satellite engineering is moving the tracking of its product development work on Satellite to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "Satellite project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs will be migrated starting at the end of May. If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "Satellite project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/SAT-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Description of problem:
Version-Release number of selected component (if applicable):
0.1.111-1
How reproducible:
Steps to Reproduce:
1. Create a user account user1/password1 with an email address you can access
2. Log out
3. Click "Forgot password"
4. Fill out username/email to reset password
5. Retrive email, click the link.
6. Reset password
7. Click the link again
Actual results:
Allowed to reset password again
Expected results:
UI should display error like "This link has expired. Please use the password reset form on the login page if you need to reset your password".
Additional info:
In fact, it would be even more secure if the link was invalidated the instant it is accessed (rather than only after the form is submitted). I think a sniffer could access the URL - if he races to fill out the form first, he would "beat" the legitimate user. But he could not access the url first - by the time he sniffs it, the legit user already beat him to it.
I guess you'd have to create a cookie or something for the first access.
git commit : 3461becab18a3cc79054d4e9d7f1f07d41170089
Updated logic to reset the token as part of updating the password. As a result, the token may only be used for updating the password 1 time.