GHSA-vwch-g97w-hfg2

Suggest an improvement
Source
https://github.com/advisories/GHSA-vwch-g97w-hfg2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-vwch-g97w-hfg2/GHSA-vwch-g97w-hfg2.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vwch-g97w-hfg2
Aliases
Related
Published
2024-01-03T16:14:54Z
Modified
2024-07-08T19:36:05Z
Severity
  • 4.8 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L CVSS Calculator
  • 5.1 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
CubeFS leaks users key in logs
Details

CubeFS was found to leak users secret keys and access keys in the logs in multiple components. When CubeCS creates new users, it leaks the users secret key. This could allow a lower-privileged user with access to the logs to retrieve sensitive information and impersonate other users with higher privileges than themselves.

There is no evidence of this vulnerability being exploited in the wild. It was found during an ongoing security audit carried out by Ada Logics in collaboration with OSTIF and the CNCF.

The issue has been patched in v3.3.1. There is no other mitigation than upgrading CubeFS.

Database specific
{
    "nvd_published_at": "2024-01-03T17:15:11Z",
    "cwe_ids": [
        "CWE-532"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-01-03T16:14:54Z"
}
References

Affected packages

Go / github.com/cubefs/cubefs

Package

Name
github.com/cubefs/cubefs
View open source insights on deps.dev
Purl
pkg:golang/github.com/cubefs/cubefs

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.1