[
https://issues.apache.org/jira/browse/CXF-6262?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14326560#comment-14326560
]
Daniel Kulp commented on CXF-6262:
----------------------------------
This is really working as designed. The Logging interceptor are low level
"byte[]" type things that just log the exact bytes that come in and don't do
any type of interpretation of the byte[]s to figure out if there is any sort of
sensitive information. However, the interceptors have a method:
{code:java}
protected String transform(String originalLogString) {
return originalLogString;
}
{code}
that you can override in a subclass to look for anything in particular and mask
things off as needed. You would need to configure in your subclass instead.
> LoggingInterceptor logs password when using UsernameToken with plaintext
> password
> ---------------------------------------------------------------------------------
>
> Key: CXF-6262
> URL: https://issues.apache.org/jira/browse/CXF-6262
> Project: CXF
> Issue Type: Bug
> Affects Versions: 2.7.14
> Reporter: Mark Anderson
>
> The LoggingInterceptor will log the password when UsernameToken with
> plaintext password is used.
> Could the password text be masked (even optionally) in the logging output as
> this could be viewed as a security issue in some environments. For example
> https is used to protect the password on the wire but it could then be
> intercepted by changing logging levels.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)