CVE Vulnerabilities

CVE-2024-38321

Insertion of Sensitive Information into Log File

Published: Aug 03, 2024 | Modified: Sep 06, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user. IBM X-Force ID: 284868.

Weakness

Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.

Affected Software

Name Vendor Start Version End Version
Business_automation_workflow Ibm 20.0.0.1 (including) 20.0.0.1 (including)
Business_automation_workflow Ibm 20.0.0.2 (including) 20.0.0.2 (including)
Business_automation_workflow Ibm 21.0.2 (including) 21.0.2 (including)
Business_automation_workflow Ibm 21.0.3 (including) 21.0.3 (including)
Business_automation_workflow Ibm 21.0.3-if002 (including) 21.0.3-if002 (including)
Business_automation_workflow Ibm 21.0.3-if005 (including) 21.0.3-if005 (including)
Business_automation_workflow Ibm 21.0.3-if006 (including) 21.0.3-if006 (including)
Business_automation_workflow Ibm 21.0.3-if007 (including) 21.0.3-if007 (including)
Business_automation_workflow Ibm 21.0.3-if008 (including) 21.0.3-if008 (including)
Business_automation_workflow Ibm 21.0.3-if009 (including) 21.0.3-if009 (including)
Business_automation_workflow Ibm 21.0.3-if010 (including) 21.0.3-if010 (including)
Business_automation_workflow Ibm 21.0.3-if011 (including) 21.0.3-if011 (including)
Business_automation_workflow Ibm 21.0.3-if012 (including) 21.0.3-if012 (including)
Business_automation_workflow Ibm 21.0.3-if013 (including) 21.0.3-if013 (including)
Business_automation_workflow Ibm 21.0.3-if014 (including) 21.0.3-if014 (including)
Business_automation_workflow Ibm 21.0.3-if015 (including) 21.0.3-if015 (including)
Business_automation_workflow Ibm 21.0.3-if016 (including) 21.0.3-if016 (including)
Business_automation_workflow Ibm 21.0.3-if017 (including) 21.0.3-if017 (including)
Business_automation_workflow Ibm 21.0.3-if028 (including) 21.0.3-if028 (including)
Business_automation_workflow Ibm 21.0.3-if029 (including) 21.0.3-if029 (including)
Business_automation_workflow Ibm 21.0.3-if030 (including) 21.0.3-if030 (including)
Business_automation_workflow Ibm 21.0.3-if031 (including) 21.0.3-if031 (including)
Business_automation_workflow Ibm 21.0.3-if032 (including) 21.0.3-if032 (including)
Business_automation_workflow Ibm 21.0.3-if033 (including) 21.0.3-if033 (including)
Business_automation_workflow Ibm 21.0.3-if034 (including) 21.0.3-if034 (including)
Business_automation_workflow Ibm 22.0.1 (including) 22.0.1 (including)
Business_automation_workflow Ibm 22.0.2 (including) 22.0.2 (including)
Business_automation_workflow Ibm 23.0.1 (including) 23.0.1 (including)
Business_automation_workflow Ibm 23.0.2 (including) 23.0.2 (including)

Extended Description

While logging all information may be helpful during development stages, it is important that logging levels be set appropriately before a product ships so that sensitive user data and system information are not accidentally exposed to potential attackers. Different log files may be produced and stored for:

Potential Mitigations

References