Uploaded image for project: 'Jira Platform Cloud'
  1. Jira Platform Cloud
  2. JRACLOUD-37117

Grant "Browse Project" permission to "User Custom Field Value" makes project visible to all users

      NOTE: This bug report is for JIRA Cloud. Using JIRA Server? See the corresponding bug report.

       

       

      Status Update

      Hi everyone,

      We have reviewed the status of this issue and there are not currently plans to fix this bug in Jira Cloud. Extensive analysis over the last couple years has indicated that the complexity of addressing this bug without causing performance degradation for customers using permission schemes with user custom field grants is significant. Based on the number of customers that have actually been affected, we cannot justify the effort required to address it at this time.

      Thanks for your understanding.

      Regards,
      Dave Meyer
      Senior Product Manager, Jira Cloud

       

       

       

      If in your permission schema, you grant Browse Project permission to "User Custom Field Value", the project is visible to all users. Regardless of whether that field is filled or not.
      JRA-31720 fixed that for the current assignee - i had hoped this would work for custom fields too.

            [JRACLOUD-37117] Grant "Browse Project" permission to "User Custom Field Value" makes project visible to all users

            Gerson Gutierrez made changes -
            Labels Original: affects-cloud affects-server jira-ninjas-explore jira-run no-cvss-required st10 New: affects-cloud affects-server jira-ninjas-explore jira-run jsw-s2 no-cvss-required st10

            Its really depressing that You choose not to fix a security bug, where users un-intentionally via the nomal (out of the box) interface can create a mis-configuration that makes a project visible to all users. I do think that is a violation of "Dont F*ck the customer"....

             

            And stating "Based on the number of customers that have actually been affected, " - its that countlable, or are you basing this on the number of bug reports from users that are aware of the problem...

             

            Normann P. Nielsen (Netic) added a comment - Its really depressing that You choose not to fix a security bug, where users un-intentionally via the nomal (out of the box) interface can create a mis-configuration that makes a project visible to all users. I do think that is a violation of "Dont F*ck the customer"....   And stating "Based on the number of customers that have actually been affected, " - its that countlable, or are you basing this on the number of bug reports from users that are aware of the problem...  

             dmeyer, Why is this closed as "won't fix" when there seems to be a duplicate that is "In progress" (JRACLOUD-75053)?

            Also, "interestingly" enough, JRACLOUD-75053 is in progress, but does not have any assignee. 

            Lars Sundell added a comment -   dmeyer , Why is this closed as "won't fix" when there seems to be a duplicate that is "In progress" ( JRACLOUD-75053 )? Also, "interestingly" enough, JRACLOUD-75053 is in progress, but does not have any assignee. 

            Hello Guys!

            We have same problem here. 
            It's critical security breach, and we need some update about that.
            Can you guys open again this feature?!

            Marccio Alcaide added a comment - Hello Guys! We have same problem here.  It's critical security breach, and we need some update about that. Can you guys open again this feature?!

            According to this comment from the server equivalent of this bug belive this bug needs to be reopened and addressed. 

            If the same apply to cloud (that achieved projects using this feature can be exposed) you we have an more severe issue. 

            And the status update is just scary. What You are basically stating is "We wont address security issues that are complex to fix". Seriously??? 

            Please reopen and add the "security" label to this issue.

            Lars Sundell added a comment - According to this comment from the server equivalent of this bug belive this bug needs to be reopened and addressed.  If the same apply to cloud (that achieved projects using this feature can be exposed) you we have an more severe issue.  And the status update is just scary. What You are basically stating is "We wont address security issues that are complex to fix". Seriously???  Please reopen and add the "security" label to this issue.
            Michal Keshet made changes -
            Link New: This issue was cloned as JRACLOUD-75053 [ JRACLOUD-75053 ]
            Monique Khairuliana (Inactive) made changes -
            Workflow Original: JIRA Bug Workflow w Kanban v6 - Restricted [ 1869406 ] New: JAC Bug Workflow v3 [ 3361417 ]
            Status Original: Resolved [ 5 ] New: Closed [ 6 ]
            Carlos Ughini made changes -
            Description Original: {panel:bgColor=#e7f4fa}
            *NOTE:* This bug report is for *JIRA Cloud*. Using *JIRA Server*? [See the corresponding bug report|http://jira.atlassian.com/browse/JRASERVER-37117].
            {panel}
             

            {panel:title=Status Update|borderStyle=solid|borderColor=#ff7f7f|titleBGColor=#ff7f7f|bgColor=#e5e5e5}

            Hi everyone,

            We have reviewed the status of this issue and there are not currently plans to fix this bug in *Jira Cloud*. Extensive analysis over the last couple years has indicated that the complexity of addressing this bug without causing performance degradation for customers using permission schemes with user custom field grants is significant. Based on the number of customers that have actually been affected, we cannot justify the effort required to address it at this time.

            Thanks for your understanding.

            Regards,
            Dave Meyer
            Senior Product Manager, Jira Cloud

            {panel} 

             

            If in your permission schema, you grant _Browse Project_ permission to _"User Custom Field Value"_, the project is visible to all users. Regardless of whether that field is filled or not.
             JRA-31720 fixed that for the current assignee - i had hoped this would work for custom fields too.
            New: {panel:bgColor=#e7f4fa}
            *NOTE:* This bug report is for *JIRA Cloud*. Using *JIRA Server*? [See the corresponding bug report|http://jira.atlassian.com/browse/JRASERVER-37117].
            {panel}
             

             
            {panel:title=Status Update|borderStyle=solid|borderColor=#ff7f7f|titleBGColor=#ff7f7f|bgColor=#e5e5e5}
            Hi everyone,

            We have reviewed the status of this issue and there are not currently plans to fix this bug in *Jira Cloud*. Extensive analysis over the last couple years has indicated that the complexity of addressing this bug without causing performance degradation for customers using permission schemes with user custom field grants is significant. Based on the number of customers that have actually been affected, we cannot justify the effort required to address it at this time.

            Thanks for your understanding.

            Regards,
            Dave Meyer
            Senior Product Manager, Jira Cloud
            {panel}
             

             

             

            If in your permission schema, you grant _Browse Project_ permission to _"User Custom Field Value"_, the project is visible to all users. Regardless of whether that field is filled or not.
             JRA-31720 fixed that for the current assignee - i had hoped this would work for custom fields too.
            Eric S (Inactive) made changes -
            Component/s New: Project Administration - Issue type, fields and Other [ 53196 ]
            Component/s Original: Project Administration [ 46539 ]
            Dave Meyer made changes -
            Resolution New: Won't Fix [ 2 ]
            Status Original: Verified [ 10005 ] New: Resolved [ 5 ]

              Unassigned Unassigned
              theidenreich Thomas Heidenreich (//S)
              Affected customers:
              56 This affects my team
              Watchers:
              67 Start watching this issue

                Created:
                Updated:
                Resolved: