Skip to content

Commit 6459b7f

Browse files
committed
remove logging that leaks the secret
1 parent 831a505 commit 6459b7f

File tree

9 files changed

+17
-13
lines changed

9 files changed

+17
-13
lines changed

src/main/java/org/owasp/wrongsecrets/challenges/cloud/Challenge11.java

+3-3
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ private String getAWSChallenge11Value() {
137137
.build();
138138

139139
AssumeRoleWithWebIdentityResponse tokenResponse = stsClient.assumeRoleWithWebIdentity(webIdentityRequest);
140-
log.info("The token value is " + tokenResponse.credentials().sessionToken());
140+
//log.debug("The token value is " + tokenResponse.credentials().sessionToken());
141141
SsmClient ssmClient = SsmClient.builder()
142142
.region(Region.of(awsRegion))
143143
.credentialsProvider(StsAssumeRoleWithWebIdentityCredentialsProvider.builder()
@@ -150,7 +150,7 @@ private String getAWSChallenge11Value() {
150150
.withDecryption(true)
151151
.build();
152152
GetParameterResponse parameterResponse = ssmClient.getParameter(parameterRequest);
153-
log.info("The parameter value is " + parameterResponse.parameter().value());
153+
//log.debug("The parameter value is " + parameterResponse.parameter().value());
154154
ssmClient.close();
155155
return parameterResponse.parameter().value();
156156
} catch (StsException e) {
@@ -188,7 +188,7 @@ private String getGCPChallenge11Value() {
188188

189189
private String getAzureChallenge11Value() {
190190
if (isAzure()) {
191-
log.info(String.format("Using Azure Key Vault URI: %s", azureVaultUri));
191+
//log.debug(String.format("Using Azure Key Vault URI: %s", azureVaultUri));
192192
return azureWrongSecret3;
193193
}
194194
log.error("Fetching secret from Azure did not work, returning default");

src/main/java/org/owasp/wrongsecrets/challenges/docker/Challenge12.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ public Spoiler spoiler() {
3939

4040
@Override
4141
public boolean answerCorrect(String answer) {
42-
log.info("challenge 12, actualdata: {}, answer: {}", getActualData(), answer);
42+
//log.debug("challenge 12, actualdata: {}, answer: {}", getActualData(), answer);
4343
return getActualData().equals(answer);
4444
}
4545

src/main/java/org/owasp/wrongsecrets/challenges/docker/Challenge13.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ public boolean isLimittedWhenOnlineHosted() {
7171

7272
private boolean isKeyCorrect(String base64EncodedKey) {
7373
if (Strings.isEmpty(base64EncodedKey) || Strings.isEmpty(plainText) || Strings.isEmpty(cipherText)) {
74-
log.info("Checking secret with values {}, {}, {}", base64EncodedKey, plainText, cipherText);
74+
//log.debug("Checking secret with values {}, {}, {}", base64EncodedKey, plainText, cipherText);
7575
return false;
7676
}
7777

src/main/java/org/owasp/wrongsecrets/challenges/docker/Challenge14.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ public boolean isLimittedWhenOnlineHosted() {
7777

7878
private String findAnswer() {
7979
if (Strings.isEmpty(keepassxPassword)) {
80-
log.info("Checking secret with values {}", keepassxPassword);
80+
//log.debug("Checking secret with values {}", keepassxPassword);
8181
return defaultKeepassValue;
8282
}
8383
KdbxCreds creds = new KdbxCreds(keepassxPassword.getBytes());
@@ -95,7 +95,7 @@ private String findAnswer() {
9595

9696
private boolean isanswerCorrectInKeeyPassx(String answer) {
9797
if (Strings.isEmpty(keepassxPassword) || Strings.isEmpty(answer)) {
98-
log.info("Checking secret with values {}, {}", keepassxPassword, answer);
98+
//log.debug("Checking secret with values {}, {}", keepassxPassword, answer);
9999
return false;
100100
}
101101
return answer.equals(findAnswer());

src/main/java/org/owasp/wrongsecrets/challenges/docker/Challenge16.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ public Spoiler spoiler() {
3939

4040
@Override
4141
public boolean answerCorrect(String answer) {
42-
log.info("challenge 16, actualdata: {}, answer: {}", getActualData(), answer);
42+
//log.debug("challenge 16, actualdata: {}, answer: {}", getActualData(), answer);
4343
return getActualData().equals(answer);
4444
}
4545

src/main/java/org/owasp/wrongsecrets/challenges/docker/Challenge17.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ public Spoiler spoiler() {
3939

4040
@Override
4141
public boolean answerCorrect(String answer) {
42-
log.info("challenge 17, actualdata: {}, answer: {}", getActualData(), answer);
42+
//log.debug("challenge 17, actualdata: {}, answer: {}", getActualData(), answer);
4343
return getActualData().equals(answer);
4444
}
4545

src/main/java/org/owasp/wrongsecrets/challenges/docker/Challenge23.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ public Spoiler spoiler() {
3030

3131
@Override
3232
public boolean answerCorrect(String answer) {
33-
log.info("challenge 23, actualdata: {}, answer: {}", getActualData(), answer);
33+
//log.debug("challenge 23, actualdata: {}, answer: {}", getActualData(), answer);
3434
return getActualData().equals(answer);
3535
}
3636

src/main/java/org/owasp/wrongsecrets/challenges/docker/Challenge24.java

+4-2
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22

33

44
import lombok.extern.slf4j.Slf4j;
5+
import org.bouncycastle.util.encoders.Hex;
56
import org.owasp.wrongsecrets.RuntimeEnvironment;
67
import org.owasp.wrongsecrets.ScoreCard;
78
import org.owasp.wrongsecrets.challenges.Challenge;
@@ -10,6 +11,7 @@
1011
import org.springframework.core.annotation.Order;
1112
import org.springframework.stereotype.Component;
1213

14+
import java.nio.charset.StandardCharsets;
1315
import java.util.List;
1416

1517
@Slf4j
@@ -33,7 +35,7 @@ public Spoiler spoiler() {
3335

3436
@Override
3537
public boolean answerCorrect(String answer) {
36-
log.info("challenge 24, actualdata: {}, answer: {}", getActualData(), answer);
38+
//log.debug("challenge 24, actualdata: {}, answer: {}", getActualData(), answer);
3739
return getActualData().equals(answer);
3840
}
3941

@@ -58,7 +60,7 @@ public boolean isLimittedWhenOnlineHosted() {
5860
}
5961

6062
public String getActualData() {
61-
return "00010203 04050607 08090A0B 0C0D0E0F 10111213 14151617 18191A1B 1C1D1E1F 20212223 24252627 28292A2B 2C2D2E2F 30313233 34353637 38393A3B 3C3D3E3F";
63+
return new String(Hex.decode("3030303130323033203034303530363037203038303930413042203043304430453046203130313131323133203134313531363137203138313931413142203143314431453146203230323132323233203234323532363237203238323932413242203243324432453246203330333133323333203334333533363337203338333933413342203343334433453346".getBytes(StandardCharsets.UTF_8)));
6264

6365
}
6466
}

src/test/java/org/owasp/wrongsecrets/challenges/docker/Challenge24Test.java

+3-1
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,16 @@
11
package org.owasp.wrongsecrets.challenges.docker;
22

33
import org.assertj.core.api.Assertions;
4+
import org.bouncycastle.util.encoders.Hex;
45
import org.junit.jupiter.api.Test;
56
import org.junit.jupiter.api.extension.ExtendWith;
67
import org.mockito.Mock;
78
import org.mockito.Mockito;
89
import org.mockito.junit.jupiter.MockitoExtension;
910
import org.owasp.wrongsecrets.ScoreCard;
1011

12+
import java.nio.charset.StandardCharsets;
13+
1114
@ExtendWith(MockitoExtension.class)
1215
class Challenge24Test {
1316

@@ -18,7 +21,6 @@ class Challenge24Test {
1821
@Test
1922
void rightAnswerShouldSolveChallenge() {
2023
var challenge = new Challenge24(scoreCard);
21-
2224
Assertions.assertThat(challenge.solved(challenge.spoiler().solution())).isTrue();
2325
Mockito.verify(scoreCard).completeChallenge(challenge);
2426
}

0 commit comments

Comments
 (0)