Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-57431

OpenShift Must-Gather Collects AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Not a Bug
    • Icon: Undefined Undefined
    • None
    • 4.15.z, 4.17.z, 4.16.z, 4.18.z, 4.19.z
    • oc
    • None
    • Quality / Stability / Reliability
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      Description of problem:

          OpenShift Must-Gather appears to be inadvertently gathering sensitive AWS credentials, specifically the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY.These credentials are typically stored as environment variables, within configuration files (e.g., ~/.aws/credentials, /etc/kubernetes/cloud/aws.conf), or as Kubernetes secrets, and are used by various OpenShift components and deployed applications to interact with AWS services.

      Version-Release number of selected component (if applicable):

          

      How reproducible:

          Always

      Steps to Reproduce:

          1. Configure an OpenShift cluster with integration to AWS (e.g., using AWS EBS for persistent volumes, or deploying applications that utilize AWS SDKs).
      
          2. Ensure that AWS credentials (e.g., AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY) are present in the environment (e.g., as environment variables in pods, or within relevant configuration files/secrets).
      
          3. Execute the oc adm must-gather command to initiate a collection.
      
          4. Extract the generated must-gather bundle.
      
          5. Search within the extracted files for strings like AWS_ACCESS_KEY_ID or AWS_SECRET_ACCESS_KEY or their corresponding values.     

      Actual results:

          The must-gather bundle contains cleartext AWS access key IDs and secret access keys.

      Expected results:

          The OpenShift Must-Gather tool should redact, mask, or entirely exclude sensitive AWS credentials from the collected diagnostic bundle. Only non-sensitive configuration details or metadata should be included.

      Additional info:

          

              aos-workloads-staff Workloads Team Bot Account
              rhn-support-ssardar Sameer Sardar
              None
              None
              Ying Zhou Ying Zhou
              None
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

                Created:
                Updated:
                Resolved: