[PM-32666] Fixes endpoint issue where you can update another by providing a valid org ID#7185
[PM-32666] Fixes endpoint issue where you can update another by providing a valid org ID#7185
Conversation
…derClientsController
|
Claude finished @JaredScar's task in 2m 12s —— View job Pull Request Re-Review: PM-32666 IDOR Fix in ProviderClientsControllerOverviewThis PR adds a security fix for an IDOR (Insecure Direct Object Reference) vulnerability in Previous Findings -- All ResolvedThe previous review identified one critical finding: the new guard clause broke two existing tests and lacked its own dedicated test. The latest commit (
Assessment
No remaining issues. This PR is ready to merge. |
|
Great job! No new security vulnerabilities introduced in this pull request |
|
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #7185 +/- ##
=======================================
Coverage 57.08% 57.08%
=======================================
Files 2028 2028
Lines 88794 88797 +3
Branches 7914 7915 +1
=======================================
+ Hits 50684 50687 +3
Misses 36279 36279
Partials 1831 1831 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|




🎟️ Tracking
https://bitwarden.atlassian.net/browse/PM-32666
📔 Objective
Fixes vulnerability following:
/providers/{providerId}/clients/{providerOrganizationId}authorizes the calleronly for the route
providerId, but does not verify thatproviderOrganizationIdbelongs to thatsame provider.