{ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2/6/2018 17:07:21", "ID": "CVE-2018-1000060", "REQUESTER": "justin@sensu.io", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sensu, Inc. Sensu Core version Before 1.2.0 & before commit 46ff10023e8cbf1b6978838f47c51b20b98fe30b contains a CWE-522 vulnerability in Sensu::Utilities.redact_sensitive() that can result in sensitive configuration data (e.g. passwords) may be logged in clear-text. This attack appear to be exploitable via victims with configuration matching a specific pattern will observe sensitive data outputted in their service log files. This vulnerability appears to have been fixed in 1.2.1 and later, after commit 46ff10023e8cbf1b6978838f47c51b20b98fe30b." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/sensu/sensu/pull/1810", "refsource": "CONFIRM", "url": "https://github.com/sensu/sensu/pull/1810" }, { "name": "RHSA-2018:0616", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0616" }, { "name": "https://github.com/sensu/sensu/issues/1804", "refsource": "CONFIRM", "url": "https://github.com/sensu/sensu/issues/1804" }, { "name": "RHSA-2018:1606", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1606" }, { "name": "RHSA-2018:1112", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1112" } ] } }