-
-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Drop WebUI default credentials #19777
Conversation
559a01a
to
3a0fdb5
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Two quick comments. Not a full review.
This comment was marked as resolved.
This comment was marked as resolved.
Will this prevent previous default credentials from working? |
Sorry, I don't understand the essence of the question... |
On new installs, makes perfect sense, there's no default, it'll be randomized, etc. But if you updated from a previous version, and have web enabled, the default credentials exist and are "valid"... during the upgrade, does it check the hashed value of that password, say "it's adminadmin, must be default" and disable it? I'm trying to determine if the update process to whatever version will "close" the security vulnerability. |
You don't seem to understand what the "default credentials" means. This only applies if there are no credentials explicitly specified in the configuration file. |
I do. I just don't know how they're implemented in qbittorrent. I'm not sure how else to word this. If you can manually set "admin:adminadmin" as credentials (which, to me seems incorrect and should be prevented since it's a known, default, credential), how are we preventing the old default credentials from continuing to work if the user just upgraded from an old version rather than a new install? |
If you don't set it there should be nothing in config file. Just test it yourself. |
gotcha. so the config file being null for that setting means it's not overriding the built in credentials. understood. would still argue that admin:adminadmin should be disallowed, but probably a discussion for another day. Thanks for the answers! =) |
|
fd26613
to
989a9cd
Compare
471f9d3
to
d63d0fc
Compare
PR is rebased to resolve conflicts. |
In case @Chocobo1 (or someone else) doesn't propose a reasonable solution, I am not against merging this PR as-is.
Unless, he accessed the webui because auth was disabled for local access and then he disabled that setting via the webui. |
I thought about this case. It still has a temporary password. |
Can you consider the following change?
Change the current And finally change
to errorMsgElement.textContent = xhr.responseText; This way the user won't be dumbfounded on why he can't login anymore. |
I wouldn't do anything more than announce on the official website that "default" credentials are no longer supported. |
I don't think it is an incompatible API change. Especially if you look the JS code around the linked line.
New: The breakage would happen if we changed the log success response. PS: I amend my previous comment. |
Some WebAPI users can legitimately count on the fact that it has only two options, |
This is how it is supposed to behave:
Note that credentials explicitly set to "admin:adminadmin" are considered as valid.