Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use of Hard-coded credentials #36395

Closed
BhawiniTripathi opened this issue Dec 8, 2018 · 1 comment
Closed

Use of Hard-coded credentials #36395

BhawiniTripathi opened this issue Dec 8, 2018 · 1 comment

Comments

@BhawiniTripathi
Copy link

BhawiniTripathi commented Dec 8, 2018

Elasticsearch version: 6.5.1

Plugins installed: X-Pack Security

JVM version: 11.0.1

OS version: Windows 10

There is a possible vulnerability which could lead to disclosure of sensitive information and gaining unauthorized access to sensitive files. This is related to CWE-798: Use of Hard-coded Credentials.

Steps to reproduce
The code issue is located in file KeyStoreWrapper, line 40. The default pass phrase key value is hard coded which is used to decrypt the private key file. Knowing the public key, private key and algorithm methods an attacker can find a back door to break the algorithm patterns used.

@rjernst
Copy link
Member

rjernst commented Dec 8, 2018

The keystore currently only provides obfuscation of settings. This is documented. It is in our plans to add the ability to password protect the keystore, see #32691.

Additionally, please do not open issues in github which you believe are vulnerabilities. See our guidlines on security disclosure.

@rjernst rjernst closed this as completed Dec 8, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants