-
Notifications
You must be signed in to change notification settings - Fork 25.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
API keys should throw an error, if unknown privilege gets added #67311
Labels
>bug
:Security/Authentication
Logging in, Usernames/passwords, Realms (Native/LDAP/AD/SAML/PKI/etc)
Team:Security
Meta label for security team
Comments
Pinging @elastic/es-security (Team:Security) |
Thank you for reporting it @spinscale ! |
ywangd
added a commit
to ywangd/elasticsearch
that referenced
this issue
Dec 23, 2021
Put Role API prevents creation of invalidate role descriptors by validating that the given cluster privileges and index previleges can be resolved. However, the same validation is not performed when creating API keys. As a result, users are able to create invalidate API keys which then fail at use time. The experience is not user friendly and inconsistent. This PR fixes it by adding the same validation logic for API key creation. Resolves: elastic#67311
ywangd
added a commit
that referenced
this issue
Jan 10, 2022
Put Role API prevents creation of invalidate role descriptors by validating that the given cluster privileges and index previleges can be resolved. However, the same validation is not performed when creating API keys. As a result, users are able to create invalidate API keys which then fail at use time. The experience is not user friendly and inconsistent. This PR fixes it by adding the same validation logic for API key creation. Resolves: #67311
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
>bug
:Security/Authentication
Logging in, Usernames/passwords, Realms (Native/LDAP/AD/SAML/PKI/etc)
Team:Security
Meta label for security team
Elasticsearch version (
bin/elasticsearch --version
): 7.10.1Description of the problem including expected versus actual behavior:
Adding an API key with a non-existing privilege returns successfully, but throws an error on the first operation that tries to get executed.
Steps to reproduce:
Note the missing
s
at the end ofmanage_index_template
- this returns a successful response with an API key.However the next request trying to create an index template returns
The text was updated successfully, but these errors were encountered: