Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(common): LFG-177 corrects IDOR #40

Merged
merged 1 commit into from
Jun 25, 2021
Merged

feat(common): LFG-177 corrects IDOR #40

merged 1 commit into from
Jun 25, 2021

Conversation

bc-chaz
Copy link
Contributor

@bc-chaz bc-chaz commented Jun 24, 2021

What?

Fixes a security issue whereby an attacker could use insecure direct object referencing (IDOR). Previously, it was possible to pass another store's hash as a query param to an API endpoint in the app. This would have permitted access to another store's data - so long as that store had installed the app and belonged to the same storefront.

Why?

Security assessment flagged IDOR.

Testing / Proof

Confirmed by requesting /api/products with an external, incorrectly signed JWT. Verified on BigCommerce by installing, loading, and uninstalling the app; established production build and TypeScript by running npm run build. Linting and unit tests also ran.

@bigcommerce/api-client-developers

@bc-chaz bc-chaz merged commit 5126fbc into bigcommerce:main Jun 25, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

2 participants