90 lines
2.5 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-33264",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-22T01:15:44.333",
"lastModified": "2023-06-02T17:41:16.350",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In Hazelcast through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3, configuration routines don't mask passwords in the member configuration properly. This allows Hazelcast Management Center users to view some of the secrets."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.0.4",
"matchCriteriaId": "A12D1018-C3A9-47B4-8930-99168FE6A6DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1",
"versionEndExcluding": "5.1.6",
"matchCriteriaId": "F5E94137-3D43-4D58-96FB-8C1738BFD37A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.2",
"versionEndIncluding": "5.2.3",
"matchCriteriaId": "1CE94172-E7C3-4FC8-B95E-8298AD3240BF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hazelcast/hazelcast/pull/24266",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}