-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issue with potential logging of sensitive data #41
Comments
I can confirm that removing the opts here fixes the issue. I guess the goal is to be able to easily pass options to the client downstream to the Tesla adapter. However, as @jordan0day suggests, we should probably remove the unnecessary attributes. I'm happy to open a pull request if you have any thoughts. |
Hi, wondering if we could get this fix merged in soon-ish? Can confirm this is happening for us as well and it is causing us to log our sensitive information (ie client_secret). The fix that @mustela added works when we hotfixed the ueberauth_okta dependency in our app, but would prefer not to fork this lib to address the security issue if there is already a fix here. |
A colleague, @slackersoft, intends to submit a PR to block a number of options currently sent to The issue manifests because OTP's However, such a workaround leaves the door open to the possibility that things not logged in a current version of a library are logged at some later date. |
Looking through application logs today, I noticed that I was seeing some log messages like:
and
[notice] Invalid option {client_secret,<<"...snipped...">} ignored
.It appears these log messages are coming from
httpc
, which is the default HTTP client used in theOAuth2.Request
module (viaTesla.Adapter.Httpc
).These are cropping up as part of the
handle_callback!
flow, duringfetch_user/2
.In
fetch_user/2
, it looks like we're loading up all the oauth config options (viaadd_oauth_options/1
) and passing them through as-is ever since #23. Maybe these more-sensitive options should be getting stripped out before being passed-along inUeberauth.Strategy.Okta.Oauth.get_user_info/2
? (Or maybeopts
doesn't need to be passed along at all toClient.get/4
, as the opts were already used to initalize the client?)The text was updated successfully, but these errors were encountered: