mirror of
https://github.com/discourse/discourse.git
synced 2025-05-21 18:12:32 +08:00
SECURITY: Impose a upper bound on limit params in various controllers
What is the problem here? In multiple controllers, we are accepting a `limit` params but do not impose any upper bound on the values being accepted. Without an upper bound, we may be allowing arbituary users from generating DB queries which may end up exhausing the resources on the server. What is the fix here? A new `fetch_limit_from_params` helper method is introduced in `ApplicationController` that can be used by controller actions to safely get the limit from the params as a default limit and maximum limit has to be set. When an invalid limit params is encountered, the server will respond with the 400 response code.
This commit is contained in:

committed by
David Taylor

parent
0976c8fad6
commit
bfc3132bb2
@ -5,11 +5,17 @@ class DraftsController < ApplicationController
|
||||
|
||||
skip_before_action :check_xhr, :preload_json
|
||||
|
||||
INDEX_LIMIT = 50
|
||||
|
||||
def index
|
||||
params.permit(:offset)
|
||||
params.permit(:limit)
|
||||
|
||||
stream = Draft.stream(user: current_user, offset: params[:offset], limit: params[:limit])
|
||||
stream =
|
||||
Draft.stream(
|
||||
user: current_user,
|
||||
offset: params[:offset],
|
||||
limit: fetch_limit_from_params(default: nil, max: INDEX_LIMIT),
|
||||
)
|
||||
|
||||
render json: { drafts: stream ? serialize_data(stream, DraftSerializer) : [] }
|
||||
end
|
||||
|
Reference in New Issue
Block a user