[GH-ISSUE #904] Data breach option from web vault gives 401 #645

Closed
opened 2026-03-03 02:01:39 +03:00 by kerem · 2 comments
Owner

Originally created by @manofthepeace on GitHub (Mar 14, 2020).
Original GitHub issue: https://github.com/dani-garcia/vaultwarden/issues/904

Subject of the issue

Using webvault 2.13.1, when using data breach report, I always get a 401 unauthorized error. HIBP_API_KEY is set properly, and works for exposed passwords report. I cannot say if it worked with older version or older vault has I just got a hibp key.

I did try to restart bitwarden_rs and also logout and back in in the web vault but same thing happens. Tested with firefox and chrome.

Your environment

  • Bitwarden_rs version: 1.14
  • Install method: built from source
  • Clients used: web-vault 2.13.1
  • Reverse proxy and version: apache
  • Version of mysql/postgresql: sqlite3

Steps to reproduce

1-go to web-vault 2.13.1, #/tools/breach-report
2-enter a email address in the box, or username
3-Click check breaches

Expected behaviour

Should get the report instead of the error.

Actual behaviour

Getting a 401 in the logs and the UI is showing a red error popup "An unexpected error has occurred"

Relevant logs

2020-03-14 12:20:24][error][ERROR] ReqError.
[CAUSE] Error(
    Status(
        401,
    ),
    "https://haveibeenpwned.com/api/v3/breachedaccount/<EMAIL>?truncateResponse=false&includeUnverified=false",
Originally created by @manofthepeace on GitHub (Mar 14, 2020). Original GitHub issue: https://github.com/dani-garcia/vaultwarden/issues/904 <!-- Please fill out the following template to make solving your problem easier and faster for us. This is only a guideline. If you think that parts are unneccessary for your issue, feel free to remove them. Remember to hide/obfuscate personal and confidential information, such as names, global IP/DNS adresses and especially passwords, if neccessary. --> ### Subject of the issue <!-- Describe your issue here.--> Using webvault 2.13.1, when using data breach report, I always get a 401 unauthorized error. HIBP_API_KEY is set properly, and works for exposed passwords report. I cannot say if it worked with older version or older vault has I just got a hibp key. I did try to restart bitwarden_rs and also logout and back in in the web vault but same thing happens. Tested with firefox and chrome. ### Your environment <!-- The version number, obtained from the logs or the admin page --> * Bitwarden_rs version: 1.14 <!-- How the server was installed: Docker image / package / built from source --> * Install method: built from source * Clients used: web-vault 2.13.1 * Reverse proxy and version: apache * Version of mysql/postgresql: sqlite3 ### Steps to reproduce <!-- Tell us how to reproduce this issue. What parameters did you set (differently from the defaults) and how did you start bitwarden_rs? --> 1-go to web-vault 2.13.1, #/tools/breach-report 2-enter a email address in the box, or username 3-Click check breaches ### Expected behaviour <!-- Tell us what should happen --> Should get the report instead of the error. ### Actual behaviour <!-- Tell us what happens instead --> Getting a 401 in the logs and the UI is showing a red error popup "An unexpected error has occurred" ### Relevant logs <!-- Share some logfiles, screenshots or output of relevant programs with us. --> ``` 2020-03-14 12:20:24][error][ERROR] ReqError. [CAUSE] Error( Status( 401, ), "https://haveibeenpwned.com/api/v3/breachedaccount/<EMAIL>?truncateResponse=false&includeUnverified=false", ```
kerem closed this issue 2026-03-03 02:01:39 +03:00
Author
Owner

@BlackDex commented on GitHub (Mar 15, 2020):

Are you sure the api key is correct? Please double check in the /admin interface.

Only the email breach report needs the api key. The exposed passwords are free to use.

I don't have a api key so i can't check. But the code looks oke, just as the API documentation tells it to be.

<!-- gh-comment-id:599183659 --> @BlackDex commented on GitHub (Mar 15, 2020): Are you sure the api key is correct? Please double check in the /admin interface. Only the email breach report needs the api key. The exposed passwords are free to use. I don't have a api key so i can't check. But the code looks oke, just as the API documentation tells it to be.
Author
Owner

@manofthepeace commented on GitHub (Mar 15, 2020):

Ok false alert, sorry for the noise. There was an extra char in the key I did input in the env file. What mislead me was the fact that the check from within the mobile app, and also the exposed password report from web-vault worked.

Also curl was working fine with my key, but the extra char was not there.

I did look at the code, I saw that the key seemed to be added to the header properly, and if the key was missing I would get something like this.

{ "statusCode": 401, "message": "Access denied due to missing hibp-api-key." }

Still unsure how other functionalities were working, but maybe its the only one that actually needs the api key.

Thank you.

<!-- gh-comment-id:599214163 --> @manofthepeace commented on GitHub (Mar 15, 2020): Ok false alert, sorry for the noise. There was an extra char in the key I did input in the env file. What mislead me was the fact that the check from within the mobile app, and also the exposed password report from web-vault worked. Also curl was working fine with my key, but the extra char was not there. I did look at the code, I saw that the key seemed to be added to the header properly, and if the key was missing I would get something like this. ` { "statusCode": 401, "message": "Access denied due to missing hibp-api-key." }` Still unsure how other functionalities were working, but maybe its the only one that actually needs the api key. Thank you.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/vaultwarden#645
No description provided.