First published: Wed Jan 03 2024(Updated: )
CubeFS is an open-source cloud-native file storage system. CubeFS prior to version 3.3.1 was found to leak users secret keys and access keys in the logs in multiple components. When CubeCS creates new users, it leaks the users secret key. This could allow a lower-privileged user with access to the logs to retrieve sensitive information and impersonate other users with higher privileges than themselves. The issue has been patched in v3.3.1. There is no other mitigation than upgrading CubeFS.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/cubefs/cubefs | <3.3.1 | 3.3.1 |
Linux Foundation CubeFS | <3.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46742 has been categorized as a security vulnerability that can impact data confidentiality.
To fix CVE-2023-46742, upgrade CubeFS to version 3.3.1 or later.
CVE-2023-46742 affects multiple components of CubeFS where secret keys and access keys are logged.
CVE-2023-46742 results in the leakage of users' secret keys and access keys in the logs.
Lower-privileged users may exploit CVE-2023-46742 to gain access to sensitive information such as secret keys.