cvelist/2023/6xxx/CVE-2023-6944.json

126 lines
4.9 KiB
JSON
Raw Normal View History

2023-12-20 15:01:12 +00:00
{
2024-01-04 11:00:33 +00:00
"data_version": "4.0",
2023-12-20 15:01:12 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-6944",
2024-01-04 11:00:33 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
2023-12-20 15:01:12 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-01-04 11:00:33 +00:00
"value": "A flaw was found in the Red Hat Developer Hub (RHDH). The catalog-import function leaks GitLab access tokens on the frontend when the base64 encoded GitLab token includes a newline at the end of the string. The sanitized error can display on the frontend, including the raw access token. Upon gaining access to this token and depending on permissions, an attacker could push malicious code to repositories, delete resources in Git, revoke or generate new keys, and sign code illegitimately."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
2024-02-04 20:00:32 +00:00
"value": "Generation of Error Message Containing Sensitive Information",
"cweId": "CWE-209"
2024-01-04 11:00:33 +00:00
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "rhdh",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "1.21.0",
"status": "unaffected"
}
]
}
}
]
}
}
]
}
},
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Developer Hub",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-6944",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2023-6944"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255204",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2255204"
}
]
},
"work_around": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Josephine Pfeiffer for reporting this issue."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
2024-01-25 16:00:36 +00:00
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
2024-01-04 11:00:33 +00:00
"confidentialityImpact": "HIGH",
2024-01-25 16:00:36 +00:00
"integrityImpact": "NONE",
2024-01-04 11:00:33 +00:00
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
2024-01-25 16:00:36 +00:00
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
2024-01-04 11:00:33 +00:00
"version": "3.1"
2023-12-20 15:01:12 +00:00
}
]
}
}