-
Notifications
You must be signed in to change notification settings - Fork 281
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] By default user can access all data streams messages #1498
Comments
It seems that document level security is not fixed as part of the PR - with regards to setting the security on the data stream alias alone. If I specify document level security with a direct reference to the backing indices the view is indeed limited for the user: "index_permissions" : [
{
"index_patterns" : [
"logstash-app-*",
"logs-app",
".ds-logs-app-*"
],
"dls" : "{\n \"bool\": {\n \"must\": {\n \"match\": {\n \"logsource.keyword\": \"userdata\"\n }\n }\n }\n}",
"fls" : [ ],
"masked_fields" : [ ],
"allowed_actions" : [
"read"
]
} But if i remove @sandeshkr419 is this something you can comment on / look into? |
@peternied: is the problem reported by @sastorsl the one you fixed in #1999 or is this yet another problem (and maybe still unresolved)? |
@sastorsl Could check if this scenario is resolved in the recent 2.2.0 release? If you still see a vulnerability please contact [email protected] and CC me [email protected] so we can investigate further. |
@rursprung Thanks for noticing this, I'm not sure based on the report if it is the same issue or a different issue without knowing more about the system configuration. |
* Fix a bad import path - Resolves opensearch-project#1487 Signed-off-by: Peter Nied <[email protected]> Signed-off-by: Peter Nied <[email protected]> Co-authored-by: Ryan Liang <[email protected]>
Describe the bug
User, only has own_index role, can perform search/delete actions on data streams in cluster.
To Reproduce
Steps to reproduce the behavior:
PUT _index_template/logs-template
{
"index_patterns": [
"logs-*"
],
"data_stream": {},
"priority": 100
}
Expected behavior
Plugin have to restrict access to data streams for user without permissions for this data streams.
Plugins enabled
opensearch-node1 opensearch-alerting 1.0.0.0
opensearch-node1 opensearch-anomaly-detection 1.0.0.0
opensearch-node1 opensearch-asynchronous-search 1.0.0.0
opensearch-node1 opensearch-index-management 1.0.1.0
opensearch-node1 opensearch-job-scheduler 1.0.0.0
opensearch-node1 opensearch-knn 1.0.0.0
opensearch-node1 opensearch-notebooks 1.0.0.0
opensearch-node1 opensearch-performance-analyzer 1.0.1.0
opensearch-node1 opensearch-reports-scheduler 1.0.0.0
opensearch-node1 opensearch-security 1.0.1.0
opensearch-node1 opensearch-sql 1.0.0.0
Screenshots
Host/Environment (please complete the following information):
The text was updated successfully, but these errors were encountered: