Page MenuHomePhabricator

When closing tasks with "Fixes xxx", try to act more authentically as the acting user
ClosedPublic

Authored by epriestley on Apr 14 2017, 12:37 PM.
Tags
None
Referenced Files
F14117000: D17688.id42540.diff
Thu, Nov 28, 5:09 PM
Unknown Object (File)
Tue, Nov 26, 6:48 AM
Unknown Object (File)
Tue, Nov 26, 3:40 AM
Unknown Object (File)
Tue, Nov 19, 3:47 PM
Unknown Object (File)
Oct 27 2024, 9:53 PM
Unknown Object (File)
Oct 25 2024, 3:55 AM
Unknown Object (File)
Oct 21 2024, 3:11 PM
Unknown Object (File)
Sep 11 2024, 9:23 PM
Subscribers
None

Details

Summary

Via HackerOne (https://hackerone.com/reports/220909). When we close commits in response to "Fixes Txxx", we currently act as the omnipotent user. This allows users to close tasks they can't see by pushing commits with "Fixes Txxx" in the message.

However, we can't actually tell who authored or committed a change: we're just using the "Author" and "Committer" values from Git in most cases, and anyone can forge those. So we can't really get this right, in a security sense.

(We can tell who pushed a change if we host it, but that's often not the right user. If GPG signing was more prevalent, we could use that. In the future, we could use side channels like having arc land tell Phabrcator who was pushing changes.)

Since I think the impact of this is fairly minor and this isn't really a security issue (more of a confusion/abuse/product issue) I think the behavior is okay more-or-less as-is, but we can do better when we do identify an author: drop permissions, and use their privileges to load the tasks which the commit "fixes".

This effectively implements this rule:

If we identify the author of a commit as user X, that commit can only affect tasks which user X can see and edit.

Note that:

  • Commits which we can't identify the author for can still affect any task.
  • Any user can forge any other user's identity (or an invalid identity) and affect any task.

So this is just a guard rail to prevent mistakes by good-faith users who type the wrong task IDs, not a real security measure.

Also note that to perform this "attack" you must already have commit access to a repository (or permission to create a repository).

Test Plan
  • Used bin/repository reparse --message <commit> --force-autoclose to run the relevant code.
  • Made the code throw before it actually applied the edit.
  • Verified that the edit was rejected if the author was recognized and can not see or could not edit the task.
  • Verified that the edit is accepted if the author can see+edit the task.
  • Verified that the edit is accepted if we can't figure out who the author is.

Diff Detail

Repository
rP Phabricator
Branch
fixas1
Lint
Lint Passed
Unit
Tests Passed
Build Status
Buildable 16470
Build 21928: Run Core Tests
Build 21927: arc lint + arc unit