Document file upload random uuid security

This commit is contained in:
Drew Blessing 2015-12-10 10:24:08 -06:00
parent 4e5897f51e
commit 63a1a581e9
2 changed files with 13 additions and 1 deletions

View File

@ -4,4 +4,5 @@
- [Rack attack](rack_attack.md)
- [Web Hooks and insecure internal web services](webhooks.md)
- [Information exclusivity](information_exclusivity.md)
- [Reset your root password](reset_root_password.md)
- [Reset your root password](reset_root_password.md)
- [User File Uploads](user_file_uploads.md)

View File

@ -0,0 +1,11 @@
# User File Uploads
Images attached to issues, merge requests or comments do not require authentication
to be viewed if someone knows the direct URL. This direct URL contains a random
32-character ID that prevents unauthorized people from guessing the URL to an
image containing sensitive information. We don't enable authentication because
these images need to be visible in the body of notification emails, which are
often read from email clients that are not authenticated with GitLab, like
Outlook, Apple Mail, or the Mail app on your mobile device.
Note that non-image attachments do require authentication to be viewed.