Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kibana 7.10.0 user management reports "Error loading user" when clicking a user with an @ in their username #83379

Closed
chrisxaustin opened this issue Nov 13, 2020 · 2 comments
Labels
Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!

Comments

@chrisxaustin
Copy link

chrisxaustin commented Nov 13, 2020

Kibana version: 7.10.0

Elasticsearch version: 7.10.0

Server OS version: CenOS 8, using ECK 1.2 default image

Browser version: Chrome 86.0.4240.75 and Firefox 81.0.2

Browser OS version: Windows 10

Original install method (e.g. download page, yum, from source, etc.): ECK 1.2

Describe the bug:

Users with an @ in their username cannot be edited in Kibana 7.10.0.
This is a regression, as it worked in 7.9.0 and all previous versions I've used in this environment.
It appears to be caused by double encoding, as the link to internal/security/users replaces the @ with %2540
First level of escaping becomes %40, then next level escapes the % as %25.

If I navigate to that path it fails, but if I replace the %2540 with @ it works.

Steps to reproduce:

  1. Create a user with an @ in their username
  2. Stack Management -> Users
  3. Click the user that has an @ in their username

Expected behavior:
Edit user page displayed

Screenshots (if relevant):

Errors in browser console (if relevant):
GET request to internal/security/users fails with 404.

Provide logs and/or server output (if relevant):

Any additional context:
Anyone affected by this can right-click the username, copy the url, replace the %40 with @, and open the fixed url in a new tab.
This opens the edit user page properly

@flash1293 flash1293 added the Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! label Nov 18, 2020
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security (Team:Security)

@legrego
Copy link
Member

legrego commented Nov 18, 2020

Hey @chrisxaustin, thanks for the bug report. I'm marking this as a duplicate of #83541, since that issue has more traction (even though yours was opened first).

@legrego legrego closed this as completed Nov 18, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Projects
None yet
Development

No branches or pull requests

4 participants