cvelist/2023/6xxx/CVE-2023-6944.json

101 lines
3.8 KiB
JSON
Raw Normal View History

2023-12-20 15:01:12 +00:00
{
2024-01-04 11:00:33 +00:00
"data_version": "4.0",
2023-12-20 15:01:12 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-6944",
2024-01-04 11:00:33 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
2023-12-20 15:01:12 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-01-04 11:00:33 +00:00
"value": "A flaw was found in the Red Hat Developer Hub (RHDH). The catalog-import function leaks GitLab access tokens on the frontend when the base64 encoded GitLab token includes a newline at the end of the string. The sanitized error can display on the frontend, including the raw access token. Upon gaining access to this token and depending on permissions, an attacker could push malicious code to repositories, delete resources in Git, revoke or generate new keys, and sign code illegitimately."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
2024-02-04 20:00:32 +00:00
"value": "Generation of Error Message Containing Sensitive Information",
"cweId": "CWE-209"
2024-01-04 11:00:33 +00:00
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Red Hat Developer Hub",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-6944",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2023-6944"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255204",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2255204"
}
]
},
"work_around": [
{
"lang": "en",
2024-04-02 14:14:09 +00:00
"value": "To mitigate this vulnerability until you can update to RHDH 1.1, ensure that the base64 encoded GitLab token does not contain a newline character at the end. Removing the newline from the token prevents the unintended disclosure of the access token through the frontend."
2024-01-04 11:00:33 +00:00
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Josephine Pfeiffer for reporting this issue."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
2024-01-25 16:00:36 +00:00
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
2024-01-04 11:00:33 +00:00
"confidentialityImpact": "HIGH",
2024-01-25 16:00:36 +00:00
"integrityImpact": "NONE",
2024-01-04 11:00:33 +00:00
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
2024-01-25 16:00:36 +00:00
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
2024-01-04 11:00:33 +00:00
"version": "3.1"
2023-12-20 15:01:12 +00:00
}
]
}
}