Skip to content

Commit

Permalink
Create aws-2023-010.yaml
Browse files Browse the repository at this point in the history
  • Loading branch information
korniko98 authored Oct 9, 2023
1 parent 2fa1884 commit cd4de1a
Showing 1 changed file with 28 additions and 0 deletions.
28 changes: 28 additions & 0 deletions vulnerabilities/aws-2023-010.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
title: Amazon WorkSpaces Windows client credential logging
slug: aws-2023-010
cves: null
affectedPlatforms:
- AWS
affectedServices:
- Amazon WorkSpaces
image: https://raw.githubusercontent.com/wiz-sec/open-cvdb/main/images/aws-2023-010.jpg
severity: Low
discoveredBy:
name: null
org: null
domain: null
twitter: null
publishedAt: 2023/10/06
disclosedAt: null
exploitabilityPeriod: null
knownITWExploitation: false
summary: |
AWS identified an issue in the Amazon WorkSpaces Windows client which resulted in unintentionally logging
connection debugging information to a user's local system. This data could include usernames or passwords

Check failure on line 21 in vulnerabilities/aws-2023-010.yaml

View workflow job for this annotation

GitHub Actions / Check Spelling

`usernames` is not a recognized word. (unrecognized-spelling)
if they contain specific characters: \ (backslash) or " (double quotes). If an attacker gained access to
an Amazon WorkSpaces user's machine, they could then compromise such credentials from the log.
manualRemediation: |
Update the client to version 5.11.0 or higher. New versions of the client will automatically delete local logs generated by vulnerable versions.
detectionMethods: null
contributor: https://github.com/korniko98

Check failure on line 27 in vulnerabilities/aws-2023-010.yaml

View workflow job for this annotation

GitHub Actions / Check Spelling

`korniko` is not a recognized word. (unrecognized-spelling)
references: https://aws.amazon.com/security/security-bulletins/AWS-2023-010/

0 comments on commit cd4de1a

Please sign in to comment.