CVE Vulnerabilities

CVE-2018-16889

Insertion of Sensitive Information into Log File

Published: Jan 28, 2019 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
5.5 MODERATE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files via plaintext. Versions up to v13.2.4 are vulnerable.

Weakness

The product writes sensitive information to a log file.

Affected Software

NameVendorStart VersionEnd Version
CephRedhat*13.2.4 (including)
Red Hat Ceph Storage 3.3RedHatceph-2:12.2.12-45.el7cp*
Red Hat Ceph Storage 3.3RedHatceph-ansible-0:3.2.24-1.el7cp*
Red Hat Ceph Storage 3.3RedHatceph-iscsi-config-0:2.6-19.el7cp*
Red Hat Ceph Storage 3.3RedHatcephmetrics-0:2.0.6-1.el7cp*
Red Hat Ceph Storage 3.3RedHatlibntirpc-0:1.7.4-1.el7cp*
Red Hat Ceph Storage 3.3RedHatnfs-ganesha-0:2.7.4-10.el7cp*
Red Hat Ceph Storage 3.3RedHatpython-crypto-0:2.6.1-16.el7ost*
Red Hat Ceph Storage 3 for UbuntuRedHatceph*
CephUbuntubionic*
CephUbuntucosmic*
CephUbuntudevel*
CephUbuntudisco*
CephUbuntuesm-infra/bionic*
CephUbuntuesm-infra/xenial*
CephUbuntuxenial*

Potential Mitigations

References