mirror of
https://github.com/netbox-community/netbox.git
synced 2026-01-13 22:03:32 +01:00
Users unable to unlock secrets after upgrade to Netbox v2.10.0 #4360
Closed
opened 2025-12-29 18:35:11 +01:00 by adam
·
15 comments
No Branch/Tag Specified
main
21050-device-oob-ip-may-become-orphaned
21102-fix-graphiql-explorer
20911-dropdown
20239-plugin-menu-classes-mutable-state
21097-graphql-id-lookups
feature
fix_module_substitution
20923-dcim-templates
20044-elevation-stuck-lightmode
feature-ip-prefix-link
v4.5-beta1-release
20068-import-moduletype-attrs
20766-fix-german-translation-code-literals
20378-del-script
7604-filter-modifiers-v3
circuit-swap
12318-case-insensitive-uniqueness
20637-improve-device-q-filter
20660-script-load
19724-graphql
20614-update-ruff
14884-script
02496-max-page
19720-macaddress-interface-generic-relation
19408-circuit-terminations-export-templates
20203-openapi-check
fix-19669-api-image-download
7604-filter-modifiers
19275-fixes-interface-bulk-edit
fix-17794-get_field_value_return_list
11507-show-aggregate-and-rir-on-api
9583-add_column_specific_search_field_to_tables
v4.5.0
v4.4.10
v4.4.9
v4.5.0-beta1
v4.4.8
v4.4.7
v4.4.6
v4.4.5
v4.4.4
v4.4.3
v4.4.2
v4.4.1
v4.4.0
v4.3.7
v4.4.0-beta1
v4.3.6
v4.3.5
v4.3.4
v4.3.3
v4.3.2
v4.3.1
v4.3.0
v4.2.9
v4.3.0-beta2
v4.2.8
v4.3.0-beta1
v4.2.7
v4.2.6
v4.2.5
v4.2.4
v4.2.3
v4.2.2
v4.2.1
v4.2.0
v4.1.11
v4.1.10
v4.1.9
v4.1.8
v4.2-beta1
v4.1.7
v4.1.6
v4.1.5
v4.1.4
v4.1.3
v4.1.2
v4.1.1
v4.1.0
v4.0.11
v4.0.10
v4.0.9
v4.1-beta1
v4.0.8
v4.0.7
v4.0.6
v4.0.5
v4.0.3
v4.0.2
v4.0.1
v4.0.0
v3.7.8
v3.7.7
v4.0-beta2
v3.7.6
v3.7.5
v4.0-beta1
v3.7.4
v3.7.3
v3.7.2
v3.7.1
v3.7.0
v3.6.9
v3.6.8
v3.6.7
v3.7-beta1
v3.6.6
v3.6.5
v3.6.4
v3.6.3
v3.6.2
v3.6.1
v3.6.0
v3.5.9
v3.6-beta2
v3.5.8
v3.6-beta1
v3.5.7
v3.5.6
v3.5.5
v3.5.4
v3.5.3
v3.5.2
v3.5.1
v3.5.0
v3.4.10
v3.4.9
v3.5-beta2
v3.4.8
v3.5-beta1
v3.4.7
v3.4.6
v3.4.5
v3.4.4
v3.4.3
v3.4.2
v3.4.1
v3.4.0
v3.3.10
v3.3.9
v3.4-beta1
v3.3.8
v3.3.7
v3.3.6
v3.3.5
v3.3.4
v3.3.3
v3.3.2
v3.3.1
v3.3.0
v3.2.9
v3.2.8
v3.3-beta2
v3.2.7
v3.3-beta1
v3.2.6
v3.2.5
v3.2.4
v3.2.3
v3.2.2
v3.2.1
v3.2.0
v3.1.11
v3.1.10
v3.2-beta2
v3.1.9
v3.2-beta1
v3.1.8
v3.1.7
v3.1.6
v3.1.5
v3.1.4
v3.1.3
v3.1.2
v3.1.1
v3.1.0
v3.0.12
v3.0.11
v3.0.10
v3.1-beta1
v3.0.9
v3.0.8
v3.0.7
v3.0.6
v3.0.5
v3.0.4
v3.0.3
v3.0.2
v3.0.1
v3.0.0
v2.11.12
v3.0-beta2
v2.11.11
v2.11.10
v3.0-beta1
v2.11.9
v2.11.8
v2.11.7
v2.11.6
v2.11.5
v2.11.4
v2.11.3
v2.11.2
v2.11.1
v2.11.0
v2.10.10
v2.10.9
v2.11-beta1
v2.10.8
v2.10.7
v2.10.6
v2.10.5
v2.10.4
v2.10.3
v2.10.2
v2.10.1
v2.10.0
v2.9.11
v2.10-beta2
v2.9.10
v2.10-beta1
v2.9.9
v2.9.8
v2.9.7
v2.9.6
v2.9.5
v2.9.4
v2.9.3
v2.9.2
v2.9.1
v2.9.0
v2.9-beta2
v2.8.9
v2.9-beta1
v2.8.8
v2.8.7
v2.8.6
v2.8.5
v2.8.4
v2.8.3
v2.8.2
v2.8.1
v2.8.0
v2.7.12
v2.7.11
v2.7.10
v2.7.9
v2.7.8
v2.7.7
v2.7.6
v2.7.5
v2.7.4
v2.7.3
v2.7.2
v2.7.1
v2.7.0
v2.6.12
v2.6.11
v2.6.10
v2.6.9
v2.7-beta1
Solcon-2020-01-06
v2.6.8
v2.6.7
v2.6.6
v2.6.5
v2.6.4
v2.6.3
v2.6.2
v2.6.1
v2.6.0
v2.5.13
v2.5.12
v2.6-beta1
v2.5.11
v2.5.10
v2.5.9
v2.5.8
v2.5.7
v2.5.6
v2.5.5
v2.5.4
v2.5.3
v2.5.2
v2.5.1
v2.5.0
v2.4.9
v2.5-beta2
v2.4.8
v2.5-beta1
v2.4.7
v2.4.6
v2.4.5
v2.4.4
v2.4.3
v2.4.2
v2.4.1
v2.4.0
v2.3.7
v2.4-beta1
v2.3.6
v2.3.5
v2.3.4
v2.3.3
v2.3.2
v2.3.1
v2.3.0
v2.2.10
v2.3-beta2
v2.2.9
v2.3-beta1
v2.2.8
v2.2.7
v2.2.6
v2.2.5
v2.2.4
v2.2.3
v2.2.2
v2.2.1
v2.2.0
v2.1.6
v2.2-beta2
v2.1.5
v2.2-beta1
v2.1.4
v2.1.3
v2.1.2
v2.1.1
v2.1.0
v2.0.10
v2.1-beta1
v2.0.9
v2.0.8
v2.0.7
v2.0.6
v2.0.5
v2.0.4
v2.0.3
v2.0.2
v2.0.1
v2.0.0
v2.0-beta3
v1.9.6
v1.9.5
v2.0-beta2
v1.9.4-r1
v1.9.3
v2.0-beta1
v1.9.2
v1.9.1
v1.9.0-r1
v1.8.4
v1.8.3
v1.8.2
v1.8.1
v1.8.0
v1.7.3
v1.7.2-r1
v1.7.1
v1.7.0
v1.6.3
v1.6.2-r1
v1.6.1-r1
1.6.1
v1.6.0
v1.5.2
v1.5.1
v1.5.0
v1.4.2
v1.4.1
v1.4.0
v1.3.2
v1.3.1
v1.3.0
v1.2.2
v1.2.1
v1.2.0
v1.1.0
v1.0.7-r1
v1.0.7
v1.0.6
v1.0.5
v1.0.4
v1.0.3-r1
v1.0.3
1.0.0
Labels
Clear labels
beta
breaking change
complexity: high
complexity: low
complexity: medium
needs milestone
netbox
pending closure
plugin candidate
pull-request
severity: high
severity: low
severity: medium
status: accepted
status: backlog
status: blocked
status: duplicate
status: needs owner
status: needs triage
status: revisions needed
status: under review
topic: GraphQL
topic: Internationalization
topic: OpenAPI
topic: UI/UX
topic: cabling
topic: event rules
topic: htmx navigation
topic: industrialization
topic: migrations
topic: plugins
topic: scripts
topic: templating
topic: testing
type: bug
type: deprecation
type: documentation
type: feature
type: housekeeping
type: translation
Mirrored from GitHub Pull Request
Milestone
No items
No Milestone
Projects
Clear projects
No project
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: starred/netbox#4360
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @pveronneau on GitHub (Dec 15, 2020).
Originally assigned to: @jeremystretch on GitHub.
Environment
Steps to Reproduce
Expected Behavior
Secret session should be created and the user should be able to unencrypt the device password
Observed Behavior
User recieves a "permission denied error". This happens to all users, including superusers and admins.
Browser log returns the following:
secrets.js?v2.10.0:53 Secret was not decrypted. Prompt user for private key.
secrets.js?v2.10.0:53 Secret was not decrypted. Prompt user for private key.
jquery-3.5.1.min.js:2 POST https:///api/secrets/get-session-key/ 403
send @ jquery-3.5.1.min.js:2
ajax @ jquery-3.5.1.min.js:2
get_session_key @ secrets.js?v2.10.0:80
(anonymous) @ secrets.js?v2.10.0:35
dispatch @ jquery-3.5.1.min.js:2
v.handle @ jquery-3.5.1.min.js:2
@jeremystretch commented on GitHub (Dec 15, 2020):
I'm not able to reproduce this error. What version did you upgrade from?
In what form? Can you provide a screenshot?
@pveronneau commented on GitHub (Dec 15, 2020):
Upgraded from v2.9.10 -> 2.10.0.


The form is the standard private key entry form:
Produces this dialog box
@jeremystretch commented on GitHub (Dec 15, 2020):
It looks like the API request is returning an HTTP 403 error for some reason. Can you inspect the actual network request/response to see if that reveals any clues?
@pveronneau commented on GitHub (Dec 15, 2020):
Post:
Response:
@jeremystretch commented on GitHub (Dec 16, 2020):
Ok, it's pretty clearly a CSRF failure. This usually points to a configuration error. I notice the presence of AWS load balancing cookies in the request header: are you balancing requests across multiple instances? It may be that one of the instances is either configured with a different secret key or does not have a current version of the sessions database.
@DanSheps commented on GitHub (Dec 16, 2020):
FYI: I am unable to reproduce this starting with a clean 2.9.11 and migrating to 2.10.1
@pveronneau commented on GitHub (Dec 16, 2020):
Single instance to a single database. This is a production system that has been in operation for over a year, so configuration issues are extremely unlikely at this point. We have had users managing devices and passwords this entire time without issue. The first time we've encountered this issue was post upgrade.
@jeremypng commented on GitHub (Dec 16, 2020):
I've been using 2.10 the last few days with plugin development. I have noticed that when I rebuild the container environment and initialize the admin user secret key (especially if it is the same browser instance as the previous build), it sometimes corrupts the key and I can't unlock secrets in that instance. It may be related to having a browser with a cookie set from a previous Netbox build when you perform secret actions.
Try this to reproduce it all in the same browser instance:
@itujjp commented on GitHub (Dec 16, 2020):
I have been reproducing this issue on a single instance fresh 2.10.1 build.
It was basically a matter of logging in, creating a secret which works as expected, logging out, logging back in and then attempting to access the secret which fails.
I can then delete the secret, re-create it, and it's fine till I log out and back in.
@DanSheps commented on GitHub (Dec 16, 2020):
@itujjp
Can you try and reproduce this on master.netbox.dev
Current user key is:
@jeremystretch commented on GitHub (Dec 16, 2020):
I am still unable to reproduce this using the following steps:
I've tried the above across multiple browsers, logging in and out several times on each, and repeatedly modifying the secret. I have not been able to reproduce the 403 error/CSRF failure reported above.
Please note that any bugs reported here must be reproducible using only the core NetBox code base. We can't address issues which may exist in outside projects, such as the community Docker image.
@pveronneau commented on GitHub (Dec 16, 2020):
Okay, I've found something interesting.
If you try to unlock the secret from the actual secret page, it works.
https://netbox.sitename.com/secrets/secrets/6/ for example. Once that is unlocked it will work everywhere until you logout.
However, if you attempt to unlock a secret from the device page (where I was attempting)

https://netbox.sitename.com/dcim/devices/1628/ as an example
That fails with the error. It will remain in this error state until you logout. It only does this if you attempt to unlock the secret from a fresh login from the device page. This is probably why we are seeing sporadic issues reproducing this issue.
@jeremypng commented on GitHub (Dec 16, 2020):
I replicated it without deleting the database container like @itujjp described above. I have a browser network log recorded of the issue occurring from the secret user key init if that is helpful.
@jeremystretch commented on GitHub (Dec 16, 2020):
Okay, now we're getting somewhere! I'm able to reproduce the error now, thanks. Will continue digging into it.
@jeremystretch commented on GitHub (Dec 16, 2020):
The problem was a missing CSRF token on the page, which is needed to authenticate the API request for a session key. Once the session key is retrieved successfully (by unlocking a secret via the secret's page instead of the device/VM), further attempts to unlock the secret are successful from any view. Only once the user logs out is the session key invalidated, and the bug recurs.
I've tested the applied fix thoroughly and believe the bug to be resolved, but please comment here if you find otherwise. The fix will be included in the next release (v2.10.2). In the meantime, it can be worked around by first unlocking a secret by navigating to the secret directly after logging in.