Summary
Vikunja's scoped API token enforcement for custom project background routes is method-confused. A token with only projects.background can successfully delete a project background, while a token with only projects.background_delete is rejected.
This is a scoped-token authorization bypass.
Details
I verified this locally on commit c5450fb55f5192508638cbb3a6956438452a712e.
Relevant code paths:
pkg/models/api_routes.go
pkg/routes/routes.go
pkg/modules/background/handler/background.go
Route registration exposes separate permissions for the same path:
GET /api/v1/projects/:project/background -> projects.background
DELETE /api/v1/projects/:project/background -> projects.background_delete
At enforcement time, CanDoAPIRoute() falls back to the parent group and reconstructs the child permission from the path segments only. For the DELETE request, that becomes background, so the matcher accepts any token containing projects.background without re-checking the HTTP method or matching the stored route detail.
This matters because RemoveProjectBackground() is a real destructive operation:
- It checks project update rights.
- It deletes the background file if present.
- It clears the project's
BackgroundFileID.
PoC
- Log in as a user who can update a project that already has a background.
- Create an API token with only:
{"projects":["background"]}
- Send:
DELETE /api/v1/projects/<project_id>/background
Authorization: Bearer <token>
- Observe that the request succeeds and the project background is removed.
For comparison:
- Create an API token with only:
{"projects":["background_delete"]}
- Repeat the same DELETE request.
- Observe that the request is rejected with
401 Unauthorized.
I confirmed this locally with three validations:
/api/v1/routes advertises both background and background_delete.
- The matcher unit test proves
CanDoAPIRoute() accepts DELETE for background.
- The webtest proves a real API token with only
background successfully deletes the background.
Impact
Scoped API tokens can exceed their intended capability. A token intended for project background access can delete project backgrounds, which weakens the trust model for automation and third-party integrations that rely on narrowly scoped tokens.
The attacker needs a valid API token created by a user who has update rights on the target project, but the token itself only needs the weaker projects.background permission.
References
Summary
Vikunja's scoped API token enforcement for custom project background routes is method-confused. A token with only
projects.backgroundcan successfully delete a project background, while a token with onlyprojects.background_deleteis rejected.This is a scoped-token authorization bypass.
Details
I verified this locally on commit
c5450fb55f5192508638cbb3a6956438452a712e.Relevant code paths:
pkg/models/api_routes.gopkg/routes/routes.gopkg/modules/background/handler/background.goRoute registration exposes separate permissions for the same path:
GET /api/v1/projects/:project/background->projects.backgroundDELETE /api/v1/projects/:project/background->projects.background_deleteAt enforcement time,
CanDoAPIRoute()falls back to the parent group and reconstructs the child permission from the path segments only. For the DELETE request, that becomesbackground, so the matcher accepts any token containingprojects.backgroundwithout re-checking the HTTP method or matching the stored route detail.This matters because
RemoveProjectBackground()is a real destructive operation:BackgroundFileID.PoC
{"projects":["background"]}DELETE /api/v1/projects/<project_id>/backgroundAuthorization: Bearer <token>For comparison:
{"projects":["background_delete"]}401 Unauthorized.I confirmed this locally with three validations:
/api/v1/routesadvertises bothbackgroundandbackground_delete.CanDoAPIRoute()accepts DELETE forbackground.backgroundsuccessfully deletes the background.Impact
Scoped API tokens can exceed their intended capability. A token intended for project background access can delete project backgrounds, which weakens the trust model for automation and third-party integrations that rely on narrowly scoped tokens.
The attacker needs a valid API token created by a user who has update rights on the target project, but the token itself only needs the weaker
projects.backgroundpermission.References