You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
if you mean replacing the spawning of a process that is called with a password given as argument (and a possible command injection if the user provided password contains a ' ?) by some go code that calls the same API, then yes it fixes the problem.
Though it would be probably a good idea for users to also have a way to securely call the api with "splunk cmd splunkd rest" in a secure fashion, so maybe the password can be provided from a file or from stdin (something like supporting reading the parameters from a file given after a @ symbol, etc.)
It would be great also to warn users that, if they use this splunk cmd as documented (or curl -u as documented in the page you link), there is a security issue with the command (such as for example, curl does:)
On systems where it works, curl hides the given option argument from process listings. This is not enough to protect credentials from possibly getting seen by other users on the same system as they still are visible for a moment before cleared. Such sensitive data should be retrieved from a file instead or similar and never used in clear text in a command line.
Please select the type of request
Bug
Tell us more
Describe the request
code such as
splunk-operator/pkg/splunk/enterprise/searchheadcluster.go
Line 368 in dafc9d3
executes a process with a password given as argument. The password appears in the process table and is recorded by auditing tools
Expected behavior
processes should not be forked with a password as argument
Splunk setup on K8S
Reproduction/Testing steps
K8s environment
Proposed changes(optional)
K8s collector data(optional)
Additional context(optional)
Logs as captured by stackrox
The text was updated successfully, but these errors were encountered: