<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Rundeck App for Splunk token value exposed in log events in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Rundeck-App-for-Splunk-token-value-exposed-in-log-events/m-p/391332#M47767</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;During troubleshooting, I noticed token value is exposed in clear text in some log events... That is not very good from a security perspective. Could you please fix that... below a sample event:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;09-25-2018 04:42:08.751 +0000 ERROR ExecProcessor - message from "python &amp;lt;...&amp;gt;/splunk/etc/apps/rundeck_app/bin/rundeck.py" ERROR:Rundeck:rundeck://users : HTTP Request error: 400 Client Error: Bad Request for url: &lt;A href="https://&amp;lt;FQDN&amp;gt;/api/18/user/list?authtoken=&amp;lt;MY" target="test_blank"&gt;https://&amp;lt;FQDN&amp;gt;/api/18/user/list?authtoken=&amp;lt;MY&lt;/A&gt; TOKEN !&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Regards.&lt;/P&gt;</description>
    <pubDate>Tue, 25 Sep 2018 04:46:30 GMT</pubDate>
    <dc:creator>sylbaea</dc:creator>
    <dc:date>2018-09-25T04:46:30Z</dc:date>
    <item>
      <title>Rundeck App for Splunk token value exposed in log events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Rundeck-App-for-Splunk-token-value-exposed-in-log-events/m-p/391332#M47767</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;During troubleshooting, I noticed token value is exposed in clear text in some log events... That is not very good from a security perspective. Could you please fix that... below a sample event:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;09-25-2018 04:42:08.751 +0000 ERROR ExecProcessor - message from "python &amp;lt;...&amp;gt;/splunk/etc/apps/rundeck_app/bin/rundeck.py" ERROR:Rundeck:rundeck://users : HTTP Request error: 400 Client Error: Bad Request for url: &lt;A href="https://&amp;lt;FQDN&amp;gt;/api/18/user/list?authtoken=&amp;lt;MY" target="test_blank"&gt;https://&amp;lt;FQDN&amp;gt;/api/18/user/list?authtoken=&amp;lt;MY&lt;/A&gt; TOKEN !&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 04:46:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Rundeck-App-for-Splunk-token-value-exposed-in-log-events/m-p/391332#M47767</guid>
      <dc:creator>sylbaea</dc:creator>
      <dc:date>2018-09-25T04:46:30Z</dc:date>
    </item>
    <item>
      <title>Re: Rundeck App for Splunk token value exposed in log events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Rundeck-App-for-Splunk-token-value-exposed-in-log-events/m-p/391333#M47768</link>
      <description>&lt;P&gt;Thank you for pointing this out.  We're looking at it and will have a workaround and/or fix as soon as possible.&lt;/P&gt;

&lt;P&gt;Paul M. Lambert&lt;BR /&gt;
Platform Solutions Architect&lt;BR /&gt;
Rundeck, Inc&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 20:24:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Rundeck-App-for-Splunk-token-value-exposed-in-log-events/m-p/391333#M47768</guid>
      <dc:creator>plambert</dc:creator>
      <dc:date>2018-09-25T20:24:35Z</dc:date>
    </item>
    <item>
      <title>Re: Rundeck App for Splunk token value exposed in log events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Rundeck-App-for-Splunk-token-value-exposed-in-log-events/m-p/391334#M47769</link>
      <description>&lt;P&gt;If you need an immediate workaround, please comment out line 346 of &lt;CODE&gt;$SPLUNK_HOME/etc/apps/rundeck_app/bin/rundeck.py&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;We will have a new version&amp;nbsp;with the correct fix (and not a workaround) released as soon as we can.&lt;/P&gt;

&lt;P&gt;Thank you again for noticing and reporting this.&lt;/P&gt;

&lt;P&gt;Paul M. Lambert&lt;BR /&gt;
Platform Solutions Architect&lt;BR /&gt;
Rundeck, Inc&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 23:29:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Rundeck-App-for-Splunk-token-value-exposed-in-log-events/m-p/391334#M47769</guid>
      <dc:creator>plambert</dc:creator>
      <dc:date>2018-09-25T23:29:47Z</dc:date>
    </item>
    <item>
      <title>Re: Rundeck App for Splunk token value exposed in log events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Rundeck-App-for-Splunk-token-value-exposed-in-log-events/m-p/391335#M47770</link>
      <description>&lt;P&gt;Please reach out to me at &lt;A href="mailto:plambert@rundeck.com"&gt;plambert@rundeck.com&lt;/A&gt; for a patched version of the application that we expect will resolve this issue.  If you're able to take the time to verify in your environment that it is resolved, then we will give you the chance to do so before publishing it.&lt;/P&gt;

&lt;P&gt;If you don't have the time to verify, we understand, just let me know and the updated version will be published soon after.&lt;/P&gt;

&lt;P&gt;Paul M. Lambert&lt;BR /&gt;
Platform Solutions Architect&lt;BR /&gt;
Rundeck, Inc&lt;/P&gt;</description>
      <pubDate>Tue, 02 Oct 2018 22:27:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Rundeck-App-for-Splunk-token-value-exposed-in-log-events/m-p/391335#M47770</guid>
      <dc:creator>plambert</dc:creator>
      <dc:date>2018-10-02T22:27:06Z</dc:date>
    </item>
    <item>
      <title>Re: Rundeck App for Splunk token value exposed in log events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Rundeck-App-for-Splunk-token-value-exposed-in-log-events/m-p/391336#M47771</link>
      <description>&lt;P&gt;just sent you a mail. Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Oct 2018 22:32:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Rundeck-App-for-Splunk-token-value-exposed-in-log-events/m-p/391336#M47771</guid>
      <dc:creator>sylbaea</dc:creator>
      <dc:date>2018-10-02T22:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: Rundeck App for Splunk token value exposed in log events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Rundeck-App-for-Splunk-token-value-exposed-in-log-events/m-p/391337#M47772</link>
      <description>&lt;P&gt;Version 1.0.2 of &lt;A href="https://splunkbase.splunk.com/app/4120/"&gt;The Rundeck App for Splunk&lt;/A&gt; is now available in Splunkbase and addresses this issue.  Thank you for your feedback!&lt;/P&gt;</description>
      <pubDate>Fri, 26 Oct 2018 21:55:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Rundeck-App-for-Splunk-token-value-exposed-in-log-events/m-p/391337#M47772</guid>
      <dc:creator>plambertrundeck</dc:creator>
      <dc:date>2018-10-26T21:55:44Z</dc:date>
    </item>
  </channel>
</rss>

