Skip to content

Passwords stored in plaintext. #458

Open
@firecoconut

Description

@firecoconut

EDIT THIS TITLE BEFORE POSTING. Use this template for bug reports. If you'd like to request a feature, please be as descriptive as possible and delete the template except the first section (Request Type)

Request Type

Bug

Work Environment

Question Answer
OS version (server) RHEL7
OS version (client) Win10
Cortex version / git hash 3.1.7-1
Package Type Docker
Browser type & version

Problem Description

Sensitive data (private key and passwords in the configurations) are stored in an unencrypted manner on the Cortex component after being entered in a responder's configuration. Therefore, an attacker gaining access to this component can obtain all the secrets stored there. These passwords are only accessible to users with administrative rights, so the impact is limited.

Steps to Reproduce

  1. Log in with administrator account
  2. Make request to : /api/responder?range=all&sort=%2Bname
  3. You can see plaintext password frm responders configuration

Possible Solutions

Can you hash passwords before storing ?

Complementary information

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions