-
Type:
Bug
-
Resolution: Unresolved
-
Priority:
Major - P3
-
None
-
Affects Version/s: None
-
Component/s: None
-
Environment:OS:
node.js / npm versions:
Additional info:
-
2
-
None
-
None
-
Developer Tools
Problem Statement/Rationale
When a user wants to export saved connection, the default behaviour is that the connection gets exported with credentials included. This easily may, and in our case did, lead to unwanted leakage of user passwords or OIDC tokens. Especially with OIDC connection, the fact that a user is using someone else's token may not be noticed even by the either of the users involved.
Steps to Reproduce
Use the "Connections" -> "Export Saved Connections", the checkbox "Remove Secrets" is unchecked by default, and there is no warning or confirmation request when exporting connection with secrets.
Expected Results
The expected behaviour would be for the export form to have save defaults - i.e. no adjustment to the configuration would lead to secrets not being exported - and/or warning when exporting sensitive information.
Actual Results
Using the defaults leads to secrets being exported.
Additional Notes
This behaviour got us very close to a security incident.