CVE-2023-51390 – Information Disclosure Vulnerability in Journalpump
https://notcve.org/view.php?id=CVE-2023-51390
journalpump is a daemon that takes log messages from journald and pumps them to a given output. A logging vulnerability was found in journalpump which logs out the configuration of a service integration in plaintext to the supplied logging pipeline, including credential information contained in the configuration if any. The problem has been patched in journalpump 2.5.0. journalpump es un daemon que toma mensajes de registro de journald y los envía a una salida determinada. Se encontró una vulnerabilidad de registro en journalpump que registra la configuración de una integración de servicios en texto plano en la canalización de registro proporcionada, incluida la información de credenciales contenida en la configuración, si corresponde. El problema se solucionó en journalpump 2.5.0. • https://github.com/Aiven-Open/journalpump/commit/390e69bc909ba16ad5f7b577010b4afc303361da https://github.com/Aiven-Open/journalpump/security/advisories/GHSA-738v-v386-8r6g • CWE-215: Insertion of Sensitive Information Into Debugging Code CWE-284: Improper Access Control CWE-319: Cleartext Transmission of Sensitive Information •
CVE-2023-32305 – aiven-extras PostgreSQL Privilege Escalation Through Overloaded Search Path
https://notcve.org/view.php?id=CVE-2023-32305
aiven-extras is a PostgreSQL extension. Versions prior to 1.1.9 contain a privilege escalation vulnerability, allowing elevation to superuser inside PostgreSQL databases that use the aiven-extras package. The vulnerability leverages missing schema qualifiers on privileged functions called by the aiven-extras extension. A low privileged user can create objects that collide with existing function names, which will then be executed instead. Exploiting this vulnerability could allow a low privileged user to acquire `superuser` privileges, which would allow full, unrestricted access to all data and database functions. • https://github.com/aiven/aiven-extras/commit/8682ae01bec0791708bf25791786d776e2fb0250 https://github.com/aiven/aiven-extras/security/advisories/GHSA-7r4w-fw4h-67gp https://security.netapp.com/advisory/ntap-20230616-0006 • CWE-20: Improper Input Validation CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •