Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stop leaking sensitive header values in error messages #762

Merged
merged 1 commit into from Oct 7, 2021

Conversation

grobie
Copy link
Contributor

@grobie grobie commented Oct 7, 2021

The protection against invalid header values should not leak their
content in the error message. Exceptions are commonly logged, sent to
third-party error monitoring systems, or published in internal
communication/messenger systems. A range of HTTP headers, like
Authorization, Api-Key, or similar, contain sensitive information
which should not be sent to such public destinations.


Thank you for excon, a great library!

The protection against invalid header values is helpful, but we accidentally leaked an API token today (exception -> Bugsnag -> Slack) which was passed from an ENV["API_TOKEN"] environment variable.

The protection against invalid header values should not leak their
content in the error message. Exceptions are commonly logged, sent to
third-party error monitoring systems, or published in internal
communication/messenger systems. A range of HTTP headers, like
`Authorization`, `Api-Key`, or similar, contain sensitive information
which should not be sent to such public destinations.
Copy link
Contributor

@geemus geemus left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good catch, thanks for the detailed explanation and fix.

@geemus geemus merged commit 58a8d95 into excon:master Oct 7, 2021
@geemus
Copy link
Contributor

geemus commented Oct 8, 2021

Released in v0.87.0.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants