SECURITY: Webhook secret exposed in plain text in app detail page and request logs #36
Labels
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: sneak/upaas#36
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Severity: MEDIUM
Files
internal/handlers/app.goline 130:webhookURL := "https://" + request.Host + "/webhook/" + application.WebhookSecrettemplates/app_detail.html: displays full webhook URL with secretinternal/middleware/middleware.go(Logging middleware): logs full URL including webhook secret on every requestDescription
The webhook secret is embedded directly in the URL path (
/webhook/{secret}) and:webhook_secretcolumn), alongside the hashWhile the hash-based lookup is good (avoids timing attacks), the plain-text secret is still stored and logged.
Suggested Fix
/webhook/*paths: