First published: Thu Jan 23 2025(Updated: )
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Starting in version 0.7.0 and prior to versions 0.7.15 and 0.8.3, Himmelblau is vulnerable to leaking credentials in debug logs. When debug logging is enabled, user access tokens are inadvertently logged, potentially exposing sensitive authentication data. Similarly, Kerberos Ticket-Granting Tickets (TGTs) are logged when debug logging is enabled. Both issues pose a risk of exposing sensitive credentials, particularly in environments where debug logging is enabled. Himmelblau versions 0.7.15 and 0.8.3 contain a patch that fixes both issues. Some workarounds are available for users who are unable to upgrade. For the **logon compliance script issue**, disable the `logon_script` option in `/etc/himmelblau/himmelblau.conf`, and avoid using the `-d` flag when starting the `himmelblaud` daemon. For the Kerberos CCache issue, one may disable debug logging globally by setting the `debug` option in `/etc/himmelblau/himmelblau.conf` to `false` and avoiding the `-d` parameter when starting `himmelblaud`.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Himmelblau Himmelblau | >=0.7.0<0.7.15>=0.7.0<0.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24034 is categorized as a moderate vulnerability due to its potential to leak sensitive user access tokens.
To mitigate CVE-2025-24034, upgrade Himmelblau to versions 0.7.15 or 0.8.3 or higher.
CVE-2025-24034 affects Himmelblau versions between 0.7.0 and 0.7.15 as well as versions up to 0.8.3.
CVE-2025-24034 can leak user access tokens in debug logs when debug logging is enabled.
Yes, there are release notes available that discuss the fix for CVE-2025-24034 in the affected versions.