question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Bypassing view access control using direct link

See original GitHub issue

When using the dash_app template tag, the contents are rendered in an iframe. A curious user can inspect the page source and get the direct link to the Dash app directly form the iframe. The direct link might allow the user to bypass access control and other precautions built into a project. This seems to undermine the view based access control:

Each view delegated through to plotly_dash can be wrapped using a view decoration function. This enables access to be restricted to logged-in user

How can we mitigate the risk of potential abuse, particularly when dashboards may contain sensitive data?

Issue Analytics

  • State:closed
  • Created 5 years ago
  • Comments:22 (21 by maintainers)

github_iconTop GitHub Comments

1reaction
GibbsConsultingcommented, Sep 9, 2020

@brylie The function supplied as the view_decorator should get called on every call that passes through django_plotly_dash, so you should not be able to subvert the access control by copying the link.

You can verify this by doing exactly as you describe - go to an app as an authorized user, grab one of the urls (the debugging console of your browser can help you do this), and then try to access that url as an unauthorized user.

1reaction
GibbsConsultingcommented, Dec 26, 2018

Just pulled #90 into master, which hopefully addresses this, and closing this issue. Please reopen with comments if the documentation can be improved.

Read more comments on GitHub >

github_iconTop Results From Across the Web

A01 Broken Access Control - OWASP Top 10:2021
Bypassing access control checks by modifying the URL (parameter tampering or force browsing), internal application state, or the HTML page, or by using...
Read more >
Access control vulnerabilities and privilege escalation
With vertical access controls, different types of users have access to different application functions. For example, an administrator might be able to modify...
Read more >
BEGINEER'S CRASH COURSE FOR FINDING ACCESS ...
Some applications enforce access controls at the platform layer by restricting access to specific URLs and HTTP methods based on the user's role....
Read more >
Failure to Restrict URL Access
Using this technique, an attacker can bypass website security by accessing files directly instead of following links. This enables the attacker to access ......
Read more >
A Comprehensive Guide to Broken Access Control
Gain a better understanding of broken access control, related vulnerabilities, and security risks. Explore some real-world scenarios of ...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found