-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow user data contain special JS words #109425
Allow user data contain special JS words #109425
Conversation
Pinging @elastic/kibana-core (Team:Core) |
Pinging @elastic/kibana-security (Team:Security) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Technically LGTM, I'll let security confirm that they're fine with that.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Works, I checked the field caps api. That said, __proto__
starts with an underscore so it won't appear in the field list - #2551 - however, you do get a field list with this PR which is a considerable improvement.
Thanks for the PR, I want to get a few more peoples feedback on this before we push this through. I'll plan to revisit this next week 👍 |
I started another discussion with an alternative proposal in #109544. |
@elasticmachine merge upstream |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM (see #109544 (comment))
@elasticmachine merge upstream |
@elasticmachine merge upstream |
@elasticmachine merge upstream |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm alright with us doing this for the short-term. The protection that is offered by the Elasticsearch client is insufficient as it prevents users from viewing valid data that they've ingested into Elasticsearch.
However, as I've stated a few times, I really think we need a plan to prevent prototype-pollution. Almost all Elasticsearch documents should be treated as containing user-specified input and handled very carefully.
++ agreed, we need to prioritize a cohesive plan for this. The issue is light right now, but we can use #58040 to track this work. |
💚 Build SucceededMetrics [docs]
History
To update your PR or re-run it, just comment with: |
Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
Summary
Closes #101944
Disables
disablePrototypePoisoningProtection
protection on ES client not to make an assumption on user-supplied data.