Dont leak private users via extensions (#28023)
This commit is contained in:
		
					parent
					
						
							
								089ac06969
							
						
					
				
			
			
				commit
				
					
						c6366089df
					
				
			
		
					 1 changed files with 5 additions and 0 deletions
				
			
		| 
						 | 
				
			
			@ -822,6 +822,11 @@ func UsernameSubRoute(ctx *context.Context) {
 | 
			
		|||
	reloadParam := func(suffix string) (success bool) {
 | 
			
		||||
		ctx.SetParams("username", strings.TrimSuffix(username, suffix))
 | 
			
		||||
		context_service.UserAssignmentWeb()(ctx)
 | 
			
		||||
		// check view permissions
 | 
			
		||||
		if !user_model.IsUserVisibleToViewer(ctx, ctx.ContextUser, ctx.Doer) {
 | 
			
		||||
			ctx.NotFound("user", fmt.Errorf(ctx.ContextUser.Name))
 | 
			
		||||
			return false
 | 
			
		||||
		}
 | 
			
		||||
		return !ctx.Written()
 | 
			
		||||
	}
 | 
			
		||||
	switch {
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue