-
Suggestion
-
Resolution: Unresolved
-
None
-
None
-
2
-
Issue Summary
As a side effect of allowing anonymous access to Confluence, the REST API leaks information such as group names. If your organisation uses this information for verification or authentication in other areas then this information could be used to compromise or attack. There may also be information contained in group names that would violate the GDPR regulations by making it freely available.
Environment
Any Confluence instance that is has anonymous access allowed at some level. There are some online examples below:
https://wiki.akraino.org/rest/prototype/1/search/user-or-group.json?max-results=50&query=a
https://confluence.atlassian.com/rest/prototype/1/search/user-or-group.json?max-results=50&query=a
Suggested behaviour
The ability to prevent this information from leaking when anonymous access is enabled. There are some external infrastructure changes that could be made to prevent this access, but it is not always a given that this could be implemented in the instance concerned. This should be part of Confluence's default settings.
- is related to
-
CONFSERVER-7913 Need ability to limit use of remote API to certain users, or a certain group
- Closed
- mentioned in
-
Page Loading...