CVE Vulnerabilities

CVE-2023-33187

Cleartext Transmission of Sensitive Information

Published: May 26, 2023 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to type=text via a javascript Show Password button. This differs from the expected behavior which always obfuscates type=password inputs. A customer may assume that switching to type=text would also not record this input; hence, they would not add additional highlight-mask css-class obfuscation to this part of the DOM, resulting in unintentional recording of a password value when a Show Password button is used. This issue was patched in version 6.0.0. This patch tracks changes to the type attribute of an input to ensure an input that used to be a type=password continues to be obfuscated.

Weakness

The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

Affected Software

Name Vendor Start Version End Version
Highlight Highlight * 6.0.0 (excluding)

Potential Mitigations

References