Redact ResourceId raw values from error messages

XMLWordPrintableJSON

    • Type: Task
    • Resolution: Fixed
    • Priority: Major - P3
    • 8.3.0-rc0, 8.2.4, 8.0.18, 7.0.29
    • Affects Version/s: None
    • Component/s: None
    • None
    • Catalog and Routing
    • Fully Compatible
    • v8.2, v8.0, v7.0
    • CAR Team 2025-12-22
    • 1
    • 🟦 Shard Catalog
    • None
    • None
    • None
    • None
    • None
    • None

      Currently we expose ResourceId values in various places:

      • Via the lockInfo command
      • Via logging
      • Via error messages

      If an attacker were to know the value for a given input then they could derive the random secret key we use in order to generate ResourceIds and perform the same attack as SERVER-114838.

      We should limit it such that it is only ever exposed in high permission settings such as the first two while limiting the last one.

            Assignee:
            Jordi Olivares Provencio
            Reporter:
            Jordi Olivares Provencio
            Votes:
            0 Vote for this issue
            Watchers:
            4 Start watching this issue

              Created:
              Updated:
              Resolved: