User tests: Successful: Unsuccessful:
Related to #10763
A user with permission to make ACL changes is denied access because the check is incomplete. The user that is part of the Administrator group or a child thereof can login and edit the permissions in Articles for example. However when this user tries that the access is denied because the access check is only done on the global level, not on the actual component level.
A little help from my friends @andrepereiradasilva and @infograf768
Status | New | ⇒ | Pending |
Milestone |
Added: |
Labels |
Added:
?
|
It also lets a user change the permissions of his parent group.
Category | ⇒ | ACL |
Priority | Medium | ⇒ | Critical |
@infograf768 I think a user should be able to change permissions of their own group ONLY if it is to a more restrictive setting but definitely not to give them access to something that was previously denied. They definitely should not be able to change permissions of parents - that would defeat the objective of an ACL system.
I think a user should be able to change permissions of their own group ONLY if it is to a more restrictive setting but definitely not to give them access to something that was previously denied.
If you have multiple users in the same group, one of these could decide of a change that would apply not only to himself but all members of that group. This should only imho be the privilege of the Parent Group (With ACL access) or superuser.
We also have another bug which is a security problem and I will create an issue for it:
A member of a subgroup of administrator (with access to user manager) with less permissions than the administrator group can make himself administrator when editing himself in Users Manage....
See #10775
I will propose a patch.
@brianteeman
Can you set this one as release blocker? At least until it is completed or replaced by andrepereiradasilva#53 which would anyway also be a release blocker until completed.
Status | Pending | ⇒ | Closed |
Closed_Date | 0000-00-00 00:00:00 | ⇒ | 2016-06-12 07:55:45 |
Closed_By | ⇒ | roland-d |
@roland-d
Although this works fine, it lets a user change the permissions of his own group.