CVE Vulnerabilities

CVE-2021-3429

Insertion of Sensitive Information into Log File

Published: Apr 19, 2023 | Modified: May 04, 2023
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
5.5 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.

Weakness

Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.

Affected Software

Name Vendor Start Version End Version
Cloud-init Canonical * 21.2 (excluding)
Red Hat Enterprise Linux 8 RedHat cloud-init-0:20.3-10.el8_4.5 *
Red Hat Enterprise Linux 8.1 Extended Update Support RedHat cloud-init-0:18.5-7.el8_1.6 *
Red Hat Enterprise Linux 8.2 Extended Update Support RedHat cloud-init-0:18.5-12.el8_2.10 *
Cloud-init Ubuntu bionic *
Cloud-init Ubuntu focal *
Cloud-init Ubuntu groovy *
Cloud-init Ubuntu trusty *
Cloud-init Ubuntu upstream *
Cloud-init Ubuntu xenial *

Extended Description

While logging all information may be helpful during development stages, it is important that logging levels be set appropriately before a product ships so that sensitive user data and system information are not accidentally exposed to potential attackers. Different log files may be produced and stored for:

Potential Mitigations

References