-
Notifications
You must be signed in to change notification settings - Fork 506
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
USH-001 -- Secure Credentials Leak #1596
Comments
Not sure exactly how we do this. But perhaps the |
@willdoran Is this part of the security-update for this cycle? Could you move to spec once you start speccing it? |
I've added some spec details to implementation and acceptance criteria. |
Where this says 'Check for any other sensitive fields used in the API.', is the intent to filter those fields with processorOptions, as well? |
Yes. I just didn't want to try to make an exhaustive list since by the time I've done that I might as well write the code at the same time |
@rjmackay This makes sense to me though I know what allowDuplicates means, just adding a note to the description |
I just tested this on http://csvexportsforever.v3-qa.ush.zone and there's still some data leakage in the trace somewhere. I think the API side is fine, but client needs more checking :( |
Expected behaviour
Actual behaviour
Implementation
Client
sanitizeKeys
configuration to ravenjs in platform client.API
processorOptions
config to sentry php to send data through Raven_Processor_SanitizeDataProcessorAcceptance criteria
NB: You may need to temporarily enable
allowDuplicates
and other similar config in client to more easily trigger requests to sentry.This is set here:
https://github.com/ushahidi/platform-client/blob/develop/app/index.html#L130
and the reference for config is here:
https://github.com/getsentry/raven-js/blob/master/docs/config.rst
The text was updated successfully, but these errors were encountered: