Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

various pages accessible without being admin #465

Closed
3 tasks done
koenbuyens opened this issue Apr 2, 2017 · 6 comments
Closed
3 tasks done

various pages accessible without being admin #465

koenbuyens opened this issue Apr 2, 2017 · 6 comments

Comments

@koenbuyens
Copy link

koenbuyens commented Apr 2, 2017

In raising this issue, I confirm the following (please check boxes, eg [X] - no spaces) Failure to fill the template will close your issue:

How familiar are you with the codebase?:

3

[FEATURE REQUEST | QUESTION | OTHER]:

Please submit your feature request here, so it is votable by the community. It's also easier for us to track.

[BUG | ISSUE] Expected Behaviour:
non-authenticated users should not be able to find ad domain in lists, access debug logs, etc.

[BUG | ISSUE] Actual Behaviour:
non-authenticated users can find ad domain in lists, access debug logs, etc

[BUG | ISSUE] Steps to reproduce:

(Optional) Debug token generated by pihole -d:

<token>

This template was created based on the work of udemy-dl.

@koenbuyens koenbuyens changed the title queryads accessible without being admin various pages accessible without being admin Apr 2, 2017
@DL6ER
Copy link
Member

DL6ER commented Apr 2, 2017

This is intended behavior since the querying for which adlist contains a specific domain is done by the blocking page

@AzureMarker
Copy link
Contributor

We opened up this function to unauthenticated users because, as mentioned, the block page uses this feature, and currently we don't think it leaks any sensitive information or requires authentication.

@koenbuyens
Copy link
Author

@DL6ER @Mcat12 what about debug logs?

@AzureMarker
Copy link
Contributor

Ah, missed that section, sorry. That should be protected.

@WaLLy3K
Copy link
Contributor

WaLLy3K commented Apr 12, 2017

I think a decent compromise for securing queryads.php would be to only allow localhost access to it.

Edit: Ah, you're probably right @Mcat12. Any block page would need to be modified to use 127.0.0.1 instead (and using DNS resolvable names isn't the best idea)

@AzureMarker
Copy link
Contributor

Then the blocking page and web interface (via pi.hole or IP) would be unable to use it, if I understand you correctly.

@DL6ER DL6ER closed this as completed May 5, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants