From 8ffc17d1af7440ed74d6c0d6feb2f8bc010a0907 Mon Sep 17 00:00:00 2001 From: sirux88 Date: Sun, 2 Jul 2023 08:42:53 +0200 Subject: [PATCH] added password check for manual reset password enrollment endpoint --- src/api/core/organizations.rs | 17 +++++++++++++++-- 1 file changed, 15 insertions(+), 2 deletions(-) diff --git a/src/api/core/organizations.rs b/src/api/core/organizations.rs index 551656c0..eddf1bd3 100644 --- a/src/api/core/organizations.rs +++ b/src/api/core/organizations.rs @@ -2656,6 +2656,7 @@ async fn delete_group_user( #[allow(non_snake_case)] struct OrganizationUserResetPasswordEnrollmentRequest { ResetPasswordKey: Option, + MasterPasswordHash: Option, } #[derive(Deserialize)] @@ -2837,6 +2838,19 @@ async fn put_reset_password_enrollment( err!("Reset password can't be withdrawed due to an enterprise policy"); } + let user = headers.user; + + if reset_request.ResetPasswordKey.is_some() { + match reset_request.MasterPasswordHash { + Some(password) => { + if !user.check_valid_password(&password) { + err!("Invalid or wrong password") + } + } + None => err!("No password provided"), + }; + } + org_user.reset_password_key = reset_request.ResetPasswordKey; org_user.save(&mut conn).await?; @@ -2846,8 +2860,7 @@ async fn put_reset_password_enrollment( EventType::OrganizationUserResetPasswordWithdraw as i32 }; - log_event(log_id, org_user_id, org_id, headers.user.uuid.clone(), headers.device.atype, &headers.ip.ip, &mut conn) - .await; + log_event(log_id, org_user_id, org_id, user.uuid.clone(), headers.device.atype, &headers.ip.ip, &mut conn).await; Ok(()) }