Description
An information leak occurs when system data or debugging information leaves the program through an output stream or logging function.
In the file Authentication.java,
Line 137: LOG.debug("Encrypted user key is {}", userKey); Line 148: LOG.debug("IV is {}, IV length is {}", initVector, initVector.length());
These lines may print information which can reveal some important data to user making it vulnerable to attacks, we should not log this sensitive information.
Attachments
Attachments
Issue Links
- Blocked
-
ZEPPELIN-2864 Release 0.7.3
- Resolved
- links to