Skip to content

Commit

Permalink
Merge pull request #762 from grobie/master
Browse files Browse the repository at this point in the history
Stop leaking sensitive header values in error messages
  • Loading branch information
geemus committed Oct 7, 2021
2 parents f062ba5 + 4f1d960 commit 58a8d95
Showing 1 changed file with 2 additions and 1 deletion.
3 changes: 2 additions & 1 deletion lib/excon/utils.rb
Expand Up @@ -131,7 +131,8 @@ def headers_hash_to_s(headers)
end
[values].flatten.each do |value|
if value.to_s.match(/[\r\n]/)
raise Excon::Errors::InvalidHeaderValue.new(value.to_s.inspect + ' contains forbidden "\r" or "\n"')
# Don't include the potentially sensitive header value (i.e. authorization token) in the message
raise Excon::Errors::InvalidHeaderValue.new(key.to_s + ' header value contains forbidden "\r" or "\n"')
end
headers_str << key.to_s << ': ' << value.to_s << CR_NL
end
Expand Down

0 comments on commit 58a8d95

Please sign in to comment.