-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DefaultJedisClientConfig password exposure issue #4021
Comments
|
Tagged 6.0.0 just so it stays in front of eyes more. |
If possible, I would like to take ownership of this issue. In my opinion, I can replace
Looking forward to ur reply. |
@wickdynex Thank you for your interest. I would ask you not to work on this specific issue right now. I have already mentioned in my earlier #4021 (comment),
The concerned users should use RedisCredentials/RedisCredentialsProvider. |
Thanks for your reply, I missed this #4021 (comment). So is this issue have assigned to your teammate? Otherwise, I can also fix this issue🥰. |
No. No one. |
If u'ld like to assign to me, I’d be happy to take on this issue.
Would you agree with this approach? Please let me know if you have any feedback or suggestions. Followed Questions:
Looking forward to ur reply. |
Ideally, yes.
|
Thanks. Please assign this issue to me. |
@wickdynex It's not necessary. You're welcome to craft a PR about any improvement even without the assignment. Thanks. |
Thank u. I'll try |
I’ve found that not only the |
The class DefaultJedisClientConfig overrides the getPassword method that returns a String.
Returning a string might be considered a potential security issue since an attacker might inspect the heap and find the value in plaintext.
Ideally we should just pass-through the value supplied by the provider here and not create a String based on the char[] array.
Expected behavior
Return a char[] instead of String
Actual behavior
A string is returned.
Steps to reproduce:
N/A
Redis / Jedis Configuration
N/A
Jedis version:
N/A
Redis version:
Java version:
N/A
The text was updated successfully, but these errors were encountered: