All Systems Operational

CVE Hub

beta
CVE-2023-0436
sensitive information
MEDIUM [4.5]
Last Modified: 11/21/2024
The affected versions of MongoDB Atlas Kubernetes Operator may print sensitive information like GCP service account keys and API integration secrets while DEBUG mode logging is enabled. This issue affects MongoDB Atlas Kubernetes Operator versions: 1.5.0, 1.6.0, 1.6.1, 1.7.0. Please note that this is reported on an EOL version of the product, and users are advised to upgrade to the latest supported version. Required Configuration:  DEBUG logging is not enabled by default, and must be configured by the end-user. To check the log-level of the Operator, review the flags passed in your deployment configuration (eg. https://github.com/mongodb/mongodb-atlas-kubernetes/blob/main/config/manager/manager.yaml#L27 https://github.com/mongodb/mongodb-atlas-kubernetes/blob/main/config/manager/manager.yaml#L27 )
github.com logo
https://github.com/mongodb/mongodb-atlas-kubernetes/releases/tag/v1.7.1
github.com logo
https://github.com/mongodb/mongodb-atlas-kubernetes/releases/tag/v1.7.1
CVE-2018-17450
ssrf
MEDIUM [4.3]
Last Modified: 11/21/2024
An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is Server-Side Request Forgery (SSRF) via the Kubernetes integration, leading (for example) to disclosure of a GCP service token.
about.gitlab.com logo
https://about.gitlab.com/blog/categories/releases/
about.gitlab.com logo
https://about.gitlab.com/releases/2018/10/01/security-release-gitlab-11-dot-3-dot-1-released/
about.gitlab.com logo
https://about.gitlab.com/blog/categories/releases/
+1
CVE-2023-27587
sensitive information
HIGH [7.4]
Last Modified: 11/21/2024
ReadtoMyShoe, a web app that lets users upload articles and listen to them later, generates an error message containing sensitive information prior to commit 8533b01. If an error occurs when adding an article, the website shows the user an error message. If the error originates from the Google Cloud TTS request, then it will include the full URL of the request. The request URL contains the Google Cloud API key. This has been patched in commit 8533b01. Upgrading should be accompanied by deleting the current GCP API key and issuing a new one. There are no known workarounds.
github.com logo
https://github.com/rozbb/readtomyshoe/commit/8533b01c818939a0fa919c7244d8dbf5daf032af
github.com logo
https://github.com/rozbb/readtomyshoe/security/advisories/GHSA-23g5-r34j-mr8g
github.com logo
https://github.com/rozbb/readtomyshoe/commit/8533b01c818939a0fa919c7244d8dbf5daf032af
+1
CVE-2021-30476
CRITICAL [9.8]
Last Modified: 11/21/2024
HashiCorp Terraform’s Vault Provider (terraform-provider-vault) did not correctly configure GCE-type bound labels for Vault’s GCP auth method. Fixed in 2.19.1.
github.com logo
https://github.com/hashicorp/terraform-provider-vault/issues/996
github.com logo
https://github.com/hashicorp/terraform-provider-vault/issues/996
discuss.hashicorp.com logo
https://discuss.hashicorp.com/t/hcsec-2021-11-terraform-s-vault-provider-did-not-correctly-configure-bound-labels-for-gcp-auth/23464/2
+1
CVE-2020-8567
MEDIUM [4.9]
Last Modified: 11/21/2024
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
github.com logo
https://github.com/kubernetes-sigs/secrets-store-csi-driver/issues/384
github.com logo
https://github.com/kubernetes-sigs/secrets-store-csi-driver/issues/384
groups.google.com logo
https://groups.google.com/g/kubernetes-secrets-store-csi-driver/c/BI2qisiNXHY
+1
CVE-2020-16251
authentication bypass
HIGH [8.2]
Last Modified: 11/21/2024
HashiCorp Vault and Vault Enterprise versions 0.8.3 and newer, when configured with the GCP GCE auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1.
github.com logo
https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#151
github.com logo
https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#151
hashicorp.com logo
https://www.hashicorp.com/blog/category/vault/
+3
CVE-2020-12757
CRITICAL [9.8]
Last Modified: 11/21/2024
HashiCorp Vault and Vault Enterprise 1.4.0 and 1.4.1, when configured with the GCP Secrets Engine, may incorrectly generate GCP Credentials with the default time-to-live lease duration instead of the engine-configured setting. This may lead to generated GCP credentials being valid for longer than intended. Fixed in 1.4.2.
github.com logo
https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#142-may-21st-2020
github.com logo
https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#142-may-21st-2020
hashicorp.com logo
https://www.hashicorp.com/blog/category/vault/
+1
CVE-2020-7134
MEDIUM [6.5]
Last Modified: 11/21/2024
A remote access to sensitive data vulnerability was discovered in HPE IOT + GCP version(s): 1.4.0, 1.4.1, 1.4.2, 1.2.4.2.
support.hpe.com logo
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03947en_us
support.hpe.com logo
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03947en_us
CVE-2020-7133
CRITICAL [9.8]
Last Modified: 11/21/2024
A unauthorized remote access vulnerability was discovered in HPE IOT + GCP version(s): 1.4.0, 1.4.1, 1.4.2, 1.2.4.2.
support.hpe.com logo
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03947en_us
support.hpe.com logo
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03947en_us
CVE-2019-10217
MEDIUM [6.5]
Last Modified: 11/21/2024
A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks.
github.com logo
https://github.com/ansible/ansible/issues/56269
github.com logo
https://github.com/ansible/ansible/pull/59427
github.com logo
https://github.com/ansible/ansible/issues/56269
+7