API token can be read from a log file by any user #9
Labels
famed
Famed - Tracked by Famed
lighthouse
medium
Famed - Common Vulnerability Scoring System (CVSS) - Medium
UID: CL-2021-38
Severity: medium
Type: BUG
Affected Clients: Lighthouse
Summary: A validator client uses two API keys: ".secp-sk" (secret key) and "api-token.txt" (the corresponding public key).
The spec suggests that an API token can be obtained (read) from a file or from logs.
The second method is highly insecure by design and considered as a very bad practice in web application security (e.g., OWASP Logging).
Moreover, an API token can be read from the log file by any user on the host because the file permissions for the logs are 644.
Links: sigp/lighthouse#2438
Reported: 2021-07-07
Fixed: 2021-09-13
Published: 2021-12-01
Bounty Hunter: Taurus
Bounty Points: Part of EF initiated Security Audit: https://arxiv.org/abs/2109.11684
The text was updated successfully, but these errors were encountered: