SECURITY: Hide user profiles from public

User profiles, including the summary, should be private to anonymous
users if hide_user_profiles_from_public is enabled.
This commit is contained in:
Bianca Nenciu 2023-09-27 20:10:26 +03:00 committed by Penar Musaraj
parent 6350ba2cb3
commit 76bdea5ce2
No known key found for this signature in database
GPG Key ID: E390435D881FF0F7
3 changed files with 26 additions and 6 deletions

View File

@ -114,9 +114,7 @@ class UsersController < ApplicationController
end
def show(for_card: false)
if SiteSetting.hide_user_profiles_from_public && !current_user
raise Discourse::NotFound.new(custom_message: "invalid_access", status: 403)
end
guardian.ensure_public_can_see_profiles!
@user =
fetch_user_from_params(
@ -165,9 +163,7 @@ class UsersController < ApplicationController
# This route is not used in core, but is used by theme components (e.g. https://meta.discourse.org/t/144479)
def cards
if SiteSetting.hide_user_profiles_from_public && !current_user
raise Discourse::NotFound.new(custom_message: "invalid_access", status: 403)
end
guardian.ensure_public_can_see_profiles!
user_ids = params.require(:user_ids).split(",").map(&:to_i)
raise Discourse::InvalidParameters.new(:user_ids) if user_ids.length > 50
@ -496,6 +492,8 @@ class UsersController < ApplicationController
end
def summary
guardian.ensure_public_can_see_profiles!
@user =
fetch_user_from_params(
include_inactive:

View File

@ -122,6 +122,10 @@ module UserGuardian
true
end
def public_can_see_profiles?
!SiteSetting.hide_user_profiles_from_public || !anonymous?
end
def can_see_profile?(user)
return false if user.blank?
return true if !SiteSetting.allow_users_to_hide_profile?

View File

@ -4151,6 +4151,24 @@ RSpec.describe UsersController do
expect(json["user_summary"]["post_count"]).to eq(0)
end
context "when `hide_user_profiles_from_public` site setting is enabled" do
before { SiteSetting.hide_user_profiles_from_public = true }
it "returns 200 for logged in users" do
sign_in(Fabricate(:user))
get "/u/#{user.username_lower}/summary.json"
expect(response.status).to eq(200)
end
it "returns 403 for anonymous users" do
get "/u/#{user.username_lower}/summary.json"
expect(response.status).to eq(403)
end
end
context "when `hide_profile_and_presence` user option is checked" do
before_all { user1.user_option.update_columns(hide_profile_and_presence: true) }