-
Notifications
You must be signed in to change notification settings - Fork 786
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Leaking OTP in Hadoop plugin #3296
Labels
Bug
An error, flaw, misbehavior or failure in the Monkey or Monkey Island.
Complexity: Low
Impact: High
Security
Milestone
Comments
ilija-lazoroski
added
Bug
An error, flaw, misbehavior or failure in the Monkey or Monkey Island.
Impact: Critical
Complexity: Low
labels
May 3, 2023
The regex in |
We should also consider modifying the plugin to not leak this in the first place. |
A few improvements that can be made:
|
mssalvatore
added a commit
that referenced
this issue
May 3, 2023
mssalvatore
added a commit
that referenced
this issue
May 3, 2023
mssalvatore
added a commit
that referenced
this issue
May 3, 2023
mssalvatore
added a commit
that referenced
this issue
May 3, 2023
mssalvatore
added a commit
that referenced
this issue
May 3, 2023
mssalvatore
added a commit
that referenced
this issue
May 3, 2023
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Bug
An error, flaw, misbehavior or failure in the Monkey or Monkey Island.
Complexity: Low
Impact: High
Security
Describe the bug
It seems that we are leaking OTP in Hadoop payload logging
To Reproduce
Steps to reproduce the behavior:
Expected behavior
We shouldn't be logging OTP.
Screenshots
Machine version (please complete the following information):
Tasks
common
and use it inOTPFormatter
andAuthenticationFacade.generate_otp()
The text was updated successfully, but these errors were encountered: