Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/cubefs/cubefs: CVE-2023-46742 #2438

Closed
GoVulnBot opened this issue Jan 3, 2024 · 1 comment
Closed
Assignees

Comments

@GoVulnBot
Copy link

CVE-2023-46742 references github.com/cubefs/cubefs, which may be a Go module.

Description:
CubeFS is an open-source cloud-native file storage system. CubeFS prior to version 3.3.1 was found to leak users secret keys and access keys in the logs in multiple components. When CubeCS creates new users, it leaks the users secret key. This could allow a lower-privileged user with access to the logs to retrieve sensitive information and impersonate other users with higher privileges than themselves. The issue has been patched in v3.3.1. There is no other mitigation than upgrading CubeFS.

References:

Cross references:

See doc/triage.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/cubefs/cubefs
      vulnerable_at: 2.5.2+incompatible
      packages:
        - package: cubefs
cves:
    - CVE-2023-46742
references:
    - advisory: https://github.com/cubefs/cubefs/security/advisories/GHSA-vwch-g97w-hfg2
    - fix: https://github.com/cubefs/cubefs/commit/8dccce6ac8dff3db44d7e9074094c7303a5ff5dd

@tatianab tatianab self-assigned this Jan 4, 2024
@tatianab
Copy link
Contributor

tatianab commented Jan 4, 2024

Duplicate of #2434

@tatianab tatianab marked this as a duplicate of #2434 Jan 4, 2024
@tatianab tatianab closed this as completed Jan 4, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants