-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Users can reset their own password without specifying their current password #42807
Comments
Pinging @elastic/kibana-security |
Amazing, thanks for discovering that @kobelb! Let me debug it a bit first. |
You're right, we have a And it seems to be correct behavior (e.g. in Kerberos case request will contain I'm leaning towards using your proposed solution ( But as a long term fix I was planning to get rid of authenticator.login(request, {
provider: 'basic',
sessionMode: SessionMode.NotAllowed,
value: { username, password }
}); That solution requires a new What do you think? |
I like it even better :) |
Good, I'll try go this path then! |
Currently, users can reset their own password in Kibana without specifying their current password.
I believe this is occurring because when we try to set the credentials to be used
kibana/x-pack/legacy/plugins/security/server/routes/api/v1/users.js
Lines 94 to 96 in 04a9547
they're ignored, and we end up relying upon the credentials that were associated with the request in the security's plugins "auth handler".
@azasypkin should we consider augmenting the
getUser
function exposed by the security pluginkibana/x-pack/plugins/security/server/authentication/index.ts
Lines 53 to 61 in 04a9547
to essentially what we do in the
BaseAuthenticationProvider
:kibana/x-pack/plugins/security/server/authentication/providers/base.ts
Lines 87 to 91 in 04a9547
The text was updated successfully, but these errors were encountered: