You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When using OIDC, the ID token is sent as a query string parameter in GET requests. Many web servers / ingress controllers log the query string.
Impact
A person with simple read access on ingress controllers pods' logs could retrieve an ID token, possibly granting this person more permissions than needed not only on Nebraska but on various other apps also using OIDC.
Environment and steps to reproduce
Deploy nebraska and expose it through an Ingress (I tested with Nginx)
Watch the ingress controller logs and see the query string parameter being logged :
ID Tokens should not be exposed using query string
Additional information
I am not this familiar with the various OIDC authentication flows that exist, so I may be missing something here. Maybe the token cannot be used as is, but I think it's worth checking this out ^^
The text was updated successfully, but these errors were encountered:
Because of the security weaknesses associated with the URI method
(see Section 5), including the high likelihood that the URL
containing the access token will be logged, it SHOULD NOT be used
unless it is impossible to transport the access token in the
"Authorization" request header field or the HTTP request entity-body.
Resource servers MAY support this method.
Description
When using OIDC, the ID token is sent as a query string parameter in GET requests. Many web servers / ingress controllers log the query string.
Impact
A person with simple read access on ingress controllers pods' logs could retrieve an ID token, possibly granting this person more permissions than needed not only on Nebraska but on various other apps also using OIDC.
Environment and steps to reproduce
Expected behavior
ID Tokens should not be exposed using query string
Additional information
I am not this familiar with the various OIDC authentication flows that exist, so I may be missing something here. Maybe the token cannot be used as is, but I think it's worth checking this out ^^
The text was updated successfully, but these errors were encountered: