Branch: refs/heads/master
Home:
https://github.com/tribe29/checkmk
Commit: afb5a01e45e343428a82b07991ae93bc9f3fbc4c
https://github.com/tribe29/checkmk/commit/afb5a01e45e343428a82b07991ae93bc9…
Author: Teresa Siegmantel <teresa.siegmantel(a)tribe29.com>
Date: 2023-04-17 (Mon, 17 Apr 2023)
Changed paths:
A .werks/13981
M cmk/gui/livestatus_utils/commands/downtimes.py
M tests/testlib/rest_api_client.py
M tests/unit/cmk/gui/conftest.py
M tests/unit/cmk/gui/plugins/openapi/test_openapi_downtime.py
Log Message:
-----------
13981 SEC Permission checks in REST-API service downtimes
Prior to this Werk it was possible for users to schedule downtimes for services of any
host via the REST API, even if they didn't have the permissions to do so.
The REST API will now correctly check the users permissions when putting a service into
downtime.
That not only includes the permission "wato.downtimes" but also access to the
effected host and service.
<b>Affected Versions</b>:
LI: 2.2.0 (beta)
LI: 2.1.0
<b>Vulnerability Management</b>:
We have rated the issue with a CVSS Score of 4.3 (Medium) with the following CVSS vector:
<tt>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</tt>.
and assigned CVE <tt>CVE-2023-2020</tt>.
SUP-13178
Change-Id: I3a860a02d14c0ab910c0be49a4c78c4eac8c8016
Commit: 47281e80e1a36575129f5bf4ea76d53d91098e86
https://github.com/tribe29/checkmk/commit/47281e80e1a36575129f5bf4ea76d53d9…
Author: Ronny Bruska <ronny.bruska(a)tribe29.com>
Date: 2023-04-17 (Mon, 17 Apr 2023)
Changed paths:
M cmk/gui/wato/pages/user_migrate.py
M cmk/gui/wato/pages/users.py
Log Message:
-----------
Fix gui crawl
Change-Id: I036792231a4ac360f6244d8e587ec747ceed2a10
Compare:
https://github.com/tribe29/checkmk/compare/059b0954456b...47281e80e1a3