CVE Vulnerabilities

CVE-2023-30610

Insertion of Sensitive Information into Log File

Published: Apr 19, 2023 | Modified: May 01, 2023
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

aws-sigv4 is a rust library for low level request signing in the aws cloud platform. The aws_sigv4::SigningParams struct had a derived Debug implementation. When debug-formatted, it would include a users AWS access key, AWS secret key, and security token in plaintext. When TRACE-level logging is enabled for an SDK, SigningParams is printed, thereby revealing those credentials to anyone with access to logs. All users of the AWS SDK for Rust who enabled TRACE-level logging, either globally (e.g. RUST_LOG=trace), or for the aws-sigv4 crate specifically are affected. This issue has been addressed in a set of new releases. Users are advised to upgrade. Users unable to upgrade should disable TRACE-level logging for AWS Rust SDK crates.

Weakness

Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.

Affected Software

Name Vendor Start Version End Version
Aws-sigv4 Amazon 0.2.0 (including) 0.2.0 (including)
Aws-sigv4 Amazon 0.3.0 (including) 0.3.0 (including)
Aws-sigv4 Amazon 0.4.1 (including) 0.4.1 (including)
Aws-sigv4 Amazon 0.5.2 (including) 0.5.2 (including)
Aws-sigv4 Amazon 0.6.0 (including) 0.6.0 (including)
Aws-sigv4 Amazon 0.7.0 (including) 0.7.0 (including)
Aws-sigv4 Amazon 0.8.0 (including) 0.8.0 (including)
Aws-sigv4 Amazon 0.9.0 (including) 0.9.0 (including)
Aws-sigv4 Amazon 0.10.1 (including) 0.10.1 (including)
Aws-sigv4 Amazon 0.11.0 (including) 0.11.0 (including)
Aws-sigv4 Amazon 0.12.0 (including) 0.12.0 (including)
Aws-sigv4 Amazon 0.13.0 (including) 0.13.0 (including)
Aws-sigv4 Amazon 0.14.0 (including) 0.14.0 (including)
Aws-sigv4 Amazon 0.15.0 (including) 0.15.0 (including)
Aws-sigv4 Amazon 0.46.0 (including) 0.46.0 (including)
Aws-sigv4 Amazon 0.47.0 (including) 0.47.0 (including)
Aws-sigv4 Amazon 0.48.0 (including) 0.48.0 (including)
Aws-sigv4 Amazon 0.49.0 (including) 0.49.0 (including)
Aws-sigv4 Amazon 0.50.0 (including) 0.50.0 (including)
Aws-sigv4 Amazon 0.51.0 (including) 0.51.0 (including)
Aws-sigv4 Amazon 0.52.0 (including) 0.52.0 (including)
Aws-sigv4 Amazon 0.53.1 (including) 0.53.1 (including)
Aws-sigv4 Amazon 0.54.1 (including) 0.54.1 (including)
Aws-sigv4 Amazon 0.55.0 (including) 0.55.0 (including)

Extended Description

While logging all information may be helpful during development stages, it is important that logging levels be set appropriately before a product ships so that sensitive user data and system information are not accidentally exposed to potential attackers. Different log files may be produced and stored for:

Potential Mitigations

References