@mittwald/kubernetes's secret contents leaked via debug logging
Moderate severity
GitHub Reviewed
Published
May 2, 2023
in
mittwald/node-kubernetes
•
Updated May 2, 2023
Description
Published to the GitHub Advisory Database
May 2, 2023
Reviewed
May 2, 2023
Last updated
May 2, 2023
Impact
When debug logging is enabled (via
DEBUG
environment variable), the Kubernetes client may log all response bodies into the debug log -- including sensitive data fromSecret
resources.When running in a Kubernetes cluster, this might expose sensitive information to users who are not authorised to access secrets, but have access to Pod logs (either directly using kubectl, or by Pod logs being shipped elsewhere).
Patches
Upgrade to 3.5.0 or newer.
Workarounds
Disable debug logging entirely, or exclude the
kubernetes:client
debug item (for example, usingDEBUG=*,-kubernetes:client
).References
References