Details
-
Umbrella
-
Status: Open (View Workflow)
-
P2
-
Resolution: Unresolved
-
None
-
-
CP: sprint 86, CP: Roadmap backlog, CP: sprint 85
-
Core: Platform
Description
Title | Related JIRA |
---|---|
Lack of Authentication Checks on /_/proxy/* | |
Denial of Service Via CQL Queries | |
HTTP Response Header Injection | |
No Expiration on JSON Web Tokens | |
Arbitrary URL Redirection in SAML Response | |
Misleading Permission Set Configuration | |
Cross-Site Request Forgery (CSRF) in SSO Flow | |
User Enumeration | Low TODO |
Denial of Service Through User Lockout | Low TODO |
Server Headers Reveal Excessive Information | Low TODO |
TestRail: Results
Attachments
Issue Links
- is blocked by
-
FOLIO-2556 SPIKE: investigate refresh tokens support in FOLIO
-
- Closed
-
-
FOLIO-2563 SPIKE: propose prevention of DoS via CQL query
-
- Closed
-
-
FOLIO-2564 investigate HTTP Response Header injection
-
- Closed
-
-
FOLIO-2565 Misleading Permission Set Configuration
-
- Closed
-
-
FOLIO-2578 Misleading Permission Set Configuration - Part 2
-
- Closed
-
-
MODLOGSAML-58 Arbitrary URL Redirection in SAML Response
-
- Closed
-
-
OKAPI-767 permissionsRequired required (securing APIs by default)
-
- Closed
-
-
RMB-617 Security audit of JsonSchemasAPI.java and RamlsAPI.java
-
- Open
-
- relates to
-
FOLIO-1233 Implement refresh tokens
-
- Closed
-
-
MODLOGIN-128 It is possible to fetch password hashes for all users
-
- Closed
-
-
RMB-534 Reject CQL queries that match no index in schema.json
-
- Open
-
-
MODLOGSAML-59 Umbrella: Cross-Site Request Forgery (CSRF) in SSO Flow
-
- Closed
-