First published: Tue Oct 25 2022(Updated: )
Dependency-Track is a Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Prior to version 4.6.0, performing an API request using a valid API key with insufficient permissions causes the API key to be written to Dependency-Track's audit log in clear text. Actors with access to the audit log can exploit this flaw to gain access to valid API keys. The issue has been fixed in Dependency-Track 4.6.0. Instead of logging the entire API key, only the last 4 characters of the key will be logged. It is strongly recommended to check historic logs for occurrences of this behavior, and re-generating API keys in case of leakage.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dependency-Track | <4.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39351 is a vulnerability in Dependency-Track software that allows an API key with insufficient permissions to be logged in the audit log.
CVE-2022-39351 impacts Dependency-Track by leaking API keys to the audit log when making an API request with insufficient permissions.
The severity of CVE-2022-39351 is medium, with a severity value of 4.4.
To fix CVE-2022-39351, you should update Dependency-Track to version 4.6.0 or higher.
The CWE for CVE-2022-39351 is CWE-312 (Cleartext Storage of Sensitive Information in a Log File).