IBM Cloud Private 2.1.0 , 3.1.0, 3.1.1, and 3.1.2 could allow a local privileged user to obtain sensitive OIDC token that is printed to log files, which could be used to log in to the system as another user. IBM X-Force ID: 160512.
Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cloud_private | Ibm | 2.1.0 (including) | 2.1.0.3 (including) |
Cloud_private | Ibm | 3.1.0 (including) | 3.1.0 (including) |
Cloud_private | Ibm | 3.1.1 (including) | 3.1.1 (including) |
Cloud_private | Ibm | 3.1.2 (including) | 3.1.2 (including) |
While logging all information may be helpful during development stages, it is important that logging levels be set appropriately before a product ships so that sensitive user data and system information are not accidentally exposed to potential attackers. Different log files may be produced and stored for: