diff --git a/vulnerabilities/aws-2023-010.yaml b/vulnerabilities/aws-2023-010.yaml new file mode 100644 index 0000000..031c093 --- /dev/null +++ b/vulnerabilities/aws-2023-010.yaml @@ -0,0 +1,28 @@ +title: Amazon WorkSpaces Windows client credential logging +slug: aws-2023-010 +cves: null +affectedPlatforms: +- AWS +affectedServices: +- Amazon WorkSpaces +image: https://raw.githubusercontent.com/wiz-sec/open-cvdb/main/images/aws-2023-010.jpg +severity: Low +discoveredBy: + name: null + org: null + domain: null + twitter: null +publishedAt: 2023/10/06 +disclosedAt: null +exploitabilityPeriod: null +knownITWExploitation: false +summary: | + AWS identified an issue in the Amazon WorkSpaces Windows client which resulted in unintentionally logging + connection debugging information to a user's local system. This data could include usernames or passwords + if they contain specific characters: \ (backslash) or " (double quotes). If an attacker gained access to + an Amazon WorkSpaces user's machine, they could then compromise such credentials from the log. +manualRemediation: | + Update the client to version 5.11.0 or higher. New versions of the client will automatically delete local logs generated by vulnerable versions. +detectionMethods: null +contributor: https://github.com/korniko98 +references: https://aws.amazon.com/security/security-bulletins/AWS-2023-010/