Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Excessive database privileges #1312

Open
Changaco opened this issue Nov 2, 2018 · 0 comments
Open

Excessive database privileges #1312

Changaco opened this issue Nov 2, 2018 · 0 comments
Assignees
Labels
defense protecting ourselves, our users and innocent third-parties

Comments

@Changaco
Copy link
Member

Changaco commented Nov 2, 2018

In #1311 I've finally added a protection against the deletion of the entire production database by mistake, however it's still possible to drop or truncate an entire table, especially a "leaf" table like repositories that isn't a dependency of any other object. Ideally the webapp should only be able to do what it's supposed to (SELECT, INSERT, UPDATE, DELETE), and DB admins should also be restricted to that same subset of commands by default, so that dropping a table would require executing SET ROLE dangerous first.

Relevant article: Auditing Users and Roles in PostgreSQL.

@Changaco Changaco added the defense protecting ourselves, our users and innocent third-parties label Nov 2, 2018
@Changaco Changaco self-assigned this Nov 2, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
defense protecting ourselves, our users and innocent third-parties
Development

No branches or pull requests

1 participant