cve/2023/CVE-2023-20891.md

20 lines
1.2 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-20891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20891)
![](https://img.shields.io/static/v1?label=Product&message=Isolation%20segment&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=VMware%20Tanzu%20Application%20Service%20for%20VMs&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=4.0.x%3C%204.0.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.0.x%3C%204.0.5%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File&color=brighgreen)
### Description
The VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure vulnerability due to the logging of credentials in hex encoding in platform system audit logs. A malicious non-admin user who has access to the platform system audit logs can access hex encoded CF API admin credentials and can push new malicious versions of an application. In a default deployment non-admin users do not have access to the platform system audit logs.
### POC
#### Reference
- https://www.vmware.com/security/advisories/VMSA-2023-0016.html
#### Github
No PoCs found on GitHub currently.