7 results (0.012 seconds)

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege. A vulnerability was found in cloud-init. With this flaw, exposure of sensitive data is possible in world-readable cloud-init logs. This flaw allows an attacker to use this information to find hashed passwords and possibly escalate their privilege. • https://bugs.launchpad.net/cloud-init/+bug/2013967 https://github.com/canonical/cloud-init/commit/a378b7e4f47375458651c0972e7cd813f6fe0a6b https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ATBJSXPL2IOAD2LDQRKWPLIC7QXS44GZ https://ubuntu.com/security/notices/USN-6042-1 https://access.redhat.com/security/cve/CVE-2023-1786 https://bugzilla.redhat.com/show_bug.cgi?id=2190079 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords. • https://github.com/canonical/cloud-init/commit/4d467b14363d800b2185b89790d57871f11ea88c https://ubuntu.com/security/notices/USN-5496-1 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user. A flaw was found in cloud-init. When a system is configured through cloud-init and the "Set Passwords" module is used with "chpasswd" directive and "RANDOM", the randomly generated password for the relative user is written in clear-text in a file readable by any existing user of the system. The highest threat from this vulnerability is to data confidentiality and it may allow a local attacker to log in as another user. • https://github.com/canonical/cloud-init/commit/b794d426b9ab43ea9d6371477466070d86e10668 https://access.redhat.com/security/cve/CVE-2021-3429 https://bugzilla.redhat.com/show_bug.cgi?id=1940967 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 8.1EPSS: 0%CPEs: 3EXPL: 0

In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords. En cloud-init versiones hasta 19.4, la función rand_user_password en el archivo cloudinit/config/cc_set_passwords.py posee un pequeño valor predeterminado de pwlen, lo que facilita a atacantes adivinar las contraseñas. A flaw was found in cloud-init, where it uses short passwords when generating a random password in new instances. Depending on the instance configuration, a remote or local attacker may abuse this vulnerability to guess the password of the victim user. • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795 https://github.com/canonical/cloud-init/pull/189 https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html https://access.redhat.com/security/cve/CVE-2020-8632 https://bugzilla.redhat.com/show_bug.cgi?id=1798728 • CWE-330: Use of Insufficiently Random Values CWE-521: Weak Password Requirements •

CVSS: 8.1EPSS: 0%CPEs: 3EXPL: 0

cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function. cloud-init versiones hasta 19.4 se basa en Mersenne Twister para una contraseña aleatoria, lo que facilita a atacantes predecir contraseñas, porque la función rand_str en el archivo cloudinit/util.py llama a la función random.choice. A flaw was found in cloud-init, where it uses the random.choice function when creating sensitive random strings used for generating a random password in new instances. Depending on the instance configuration, a remote or local attacker may abuse this vulnerability to guess the password of the victim user. • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1860795 https://github.com/canonical/cloud-init/pull/204 https://lists.debian.org/debian-lts-announce/2020/02/msg00021.html https://access.redhat.com/security/cve/CVE-2020-8631 https://bugzilla.redhat.com/show_bug.cgi?id=1798731 • CWE-330: Use of Insufficiently Random Values •