Insertion of Sensitive Information into Log
Moderate severity
GitHub Reviewed
Published
Nov 23, 2023
in
codeigniter4/shield
•
Updated Nov 27, 2023
Package
Affected versions
< 1.0.0-beta.8
Patched versions
1.0.0-beta.8
Description
Published to the GitHub Advisory Database
Nov 23, 2023
Reviewed
Nov 23, 2023
Published by the National Vulnerability Database
Nov 24, 2023
Last updated
Nov 27, 2023
Impact
If successful login attempts are recorded, the raw tokens are stored in the log table.
If a malicious person somehow views the data in the log table, he or she can obtain a raw token, which can then be used to send a request with that user's authority.
When you (1) use the following authentiactors,
tokens
)jwt
)hmac
)and you (2) log successful login attempts, the raw tokens are stored.
Patches
Upgrade to Shield v1.0.0-beta.8 or later.
Workarounds
Disable logging for successful login attempts by the configuration files.
Config\AuthToken::$recordLoginAttempt
toAuth::RECORD_LOGIN_ATTEMPT_FAILURE
orAuth::RECORD_LOGIN_ATTEMPT_NONE
Config\AuthJWT::$recordLoginAttempt
toAuth::RECORD_LOGIN_ATTEMPT_FAILURE
orAuth::RECORD_LOGIN_ATTEMPT_NONE
References
For more information
If you have any questions or comments about this advisory:
References