[ 
https://issues.apache.org/jira/browse/RANGER-2130?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16515419#comment-16515419
 ] 

Don Bosco Durai commented on RANGER-2130:
-----------------------------------------

[~toopt4] , I am not sure whether this is a valid issue. What you are seeing 
are the roles supported by Ranger. There is no harm in knowing all the roles 
supported by Ranger. Especially, Ranger is an open source project and the 
source code is available to everyone.

I would have been more concerned if by changing the UI fields values a regular 
user is able to impersonate as an Admin user and able to make server-side 
changes. But based on your comment, the server gives an appropriate error when 
you do it.

Let me know if you still feel this is an issue.

Thanks

> Ranger Admin - client-side control bypass
> -----------------------------------------
>
>                 Key: RANGER-2130
>                 URL: https://issues.apache.org/jira/browse/RANGER-2130
>             Project: Ranger
>          Issue Type: Bug
>          Components: admin
>    Affects Versions: 1.0.0
>            Reporter: t oo
>            Assignee: Nitin Galave
>            Priority: Major
>         Attachments: 0001-RANGER-2130.patch, Screen Shot 2018-06-11 at 
> 10.36.39 am.png, client_side_controls1.PNG, client_side_controls2.PNG
>
>
> *Risk/Issue summary finding*
> {code:java}
> Client-side Control Bypass (Ranger){code}
> *Risk/Issue summary description/detail*
> {code:java}
> The Apache Ranger application relies on client-side controls to restrict user 
> access to certain information and functionality. A user can bypass these 
> controls (by modifying client-side parameters or directly browsing to 
> specific API requests or resources) to view information without the required 
> authorisation.
> The attached screenshots show the "admin" user bypassing client-side controls 
> to modify their Role from "User" to "Admin". Whilst submitting this request 
> is unsuccessful and will not permanently change the user role, the GUI allows 
> access to sections that were previously hidden.{code}
> *Business impact / attack scenario*
> {code:java}
> Low privilege users with restricted access are able to view information that 
> is not intended for their viewing. As an example, the admin user can bypass 
> client side controls to view configuration details for the HIVE_RANGER_E2E 
> hive object. {code}
> *Recommendation*
> {code:java}
> Do not rely on client-side controls to restrict user access. Ensure that 
> server-side controls are in place to restrict unauthorised access to 
> sensitive information and APIs. {code}
>  
>  In the rangeradmin ui, on the users page, after clicking on a user. If you 
> edit the html on the site (ie in Chrome) you can remove the 'disabled' tag so 
> that the role of User becomes ungreyed out and you can change the role from 
> User to Admin!



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to