-
Notifications
You must be signed in to change notification settings - Fork 41.2k
EnvironmentEndpoint does not sanitize uri when password is directly present #17930
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
This is to be expected based on the current key-based approach to sanitising values in the endpoint. As the |
#8293 is for the |
Oops, thanks @mbhave. That's what I was missing. If we do it for the |
Closing in favor of #17939. |
The
EnvironmentEndpoint
does not sanitize the uri property when a placeholder is not present and the password is directly present. An example would be if the property value for the uri contains the exact password such asspring.data.mongodb.uri: mongodb://user:password@host1:27017
. The password is not sanitized and therefore will be exposed.The text was updated successfully, but these errors were encountered: