Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Passwords stored in plaintext. #458

Open
firecoconut opened this issue Oct 24, 2023 · 0 comments
Open

Passwords stored in plaintext. #458

firecoconut opened this issue Oct 24, 2023 · 0 comments

Comments

@firecoconut
Copy link

EDIT THIS TITLE BEFORE POSTING. Use this template for bug reports. If you'd like to request a feature, please be as descriptive as possible and delete the template except the first section (Request Type)

Request Type

Bug

Work Environment

Question Answer
OS version (server) RHEL7
OS version (client) Win10
Cortex version / git hash 3.1.7-1
Package Type Docker
Browser type & version

Problem Description

Sensitive data (private key and passwords in the configurations) are stored in an unencrypted manner on the Cortex component after being entered in a responder's configuration. Therefore, an attacker gaining access to this component can obtain all the secrets stored there. These passwords are only accessible to users with administrative rights, so the impact is limited.

Steps to Reproduce

  1. Log in with administrator account
  2. Make request to : /api/responder?range=all&sort=%2Bname
  3. You can see plaintext password frm responders configuration

Possible Solutions

Can you hash passwords before storing ?

Complementary information

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant