CVE Vulnerabilities

CVE-2021-3528

Insertion of Sensitive Information into Log File

Published: May 13, 2021 | Modified: Nov 07, 2023
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.5 MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.8 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu

A flaw was found in noobaa-operator in versions before 5.7.0, where internal RPC AuthTokens between the noobaa operator and the noobaa core are leaked into log files. An attacker with access to the log files could use this AuthToken to gain additional access into noobaa deployment and can read/modify system configuration.

Weakness

Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.

Affected Software

Name Vendor Start Version End Version
Noobaa-operator Redhat * 5.7.0 (excluding)
Red Hat OpenShift Container Storage 4.6.0 on RHEL-8 RedHat ocs4/mcg-rhel8-operator:5.6.0-57.43b2f28.5.6 *
Red Hat OpenShift Container Storage 4.7.0 on RHEL-8 RedHat ocs4/mcg-rhel8-operator:5.7.0-69.85e2026.5.7 *

Extended Description

While logging all information may be helpful during development stages, it is important that logging levels be set appropriately before a product ships so that sensitive user data and system information are not accidentally exposed to potential attackers. Different log files may be produced and stored for:

Potential Mitigations

References