
CVE-2023-1786 – sensitive data exposure in cloud-init logs
https://notcve.org/view.php?id=CVE-2023-1786
26 Apr 2023 — Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege. A vulnerability was found in cloud-init. With this flaw, exposure of sensitive data is possible in world-readable cloud-init logs. This flaw allows an attacker to use this information to find hashed passwords and possibly escalate their privilege. • https://bugs.launchpad.net/cloud-init/+bug/2013967 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-532: Insertion of Sensitive Information into Log File •

CVE-2022-2084 – sensitive data exposure in cloud-init logs
https://notcve.org/view.php?id=CVE-2022-2084
30 Jun 2022 — Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords. Mike Stroyan discovered that cloud-init could log password hashes when reporting schema failures. An attacker with access to these logs could potentially use this to gain user credentials. • https://github.com/canonical/cloud-init/commit/4d467b14363d800b2185b89790d57871f11ea88c • CWE-532: Insertion of Sensitive Information into Log File •

CVE-2021-3429 – sensitive data exposure in cloud-init logs
https://notcve.org/view.php?id=CVE-2021-3429
10 Aug 2021 — When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user. A flaw was found in cloud-init. When a system is configured through cloud-init and the "Set Passwords" module is used with "chpasswd" directive and "RANDOM", the randomly generated password for the relative user is written in clear-text in a file readable by any exist... • https://github.com/canonical/cloud-init/commit/b794d426b9ab43ea9d6371477466070d86e10668 • CWE-532: Insertion of Sensitive Information into Log File •

CVE-2020-8632 – cloud-init: Too short random password length in cc_set_password in config/cc_set_passwords.py
https://notcve.org/view.php?id=CVE-2020-8632
05 Feb 2020 — In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords. En cloud-init versiones hasta 19.4, la función rand_user_password en el archivo cloudinit/config/cc_set_passwords.py posee un pequeño valor predeterminado de pwlen, lo que facilita a atacantes adivinar las contraseñas. A flaw was found in cloud-init, where it uses short passwords when generating a random password in new instances. Dep... • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html • CWE-330: Use of Insufficiently Random Values CWE-521: Weak Password Requirements •

CVE-2020-8631 – cloud-init: Use of random.choice when generating random password
https://notcve.org/view.php?id=CVE-2020-8631
05 Feb 2020 — cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function. cloud-init versiones hasta 19.4 se basa en Mersenne Twister para una contraseña aleatoria, lo que facilita a atacantes predecir contraseñas, porque la función rand_str en el archivo cloudinit/util.py llama a la función random.choice. A flaw was found in cloud-init, where it uses the random.choice function w... • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00042.html • CWE-330: Use of Insufficiently Random Values •

CVE-2012-6639
https://notcve.org/view.php?id=CVE-2012-6639
25 Nov 2019 — An privilege elevation vulnerability exists in Cloud-init before 0.7.0 when requests to an untrusted system are submitted for EC2 instance data. Se presenta una vulnerabilidad de elevación de privilegios en Cloud-init versiones anteriores a 0.7.0, cuando se envían peticiones a un sistema no confiable para datos de la instancia EC2. • http://www.openwall.com/lists/oss-security/2014/03/06/7 • CWE-269: Improper Privilege Management •

CVE-2018-10896 – cloud-init: default configuration disabled deletion of SSH host keys
https://notcve.org/view.php?id=CVE-2018-10896
01 Aug 2018 — The default cloud-init configuration, in cloud-init 0.6.2 and newer, included "ssh_deletekeys: 0", disabling cloud-init's deletion of ssh host keys. In some environments, this could lead to instances created by cloning a golden master or template system, sharing ssh host keys, and being able to impersonate one another or conduct man-in-the-middle attacks. La configuración por defecto en cloud-init, en versiones a partir de la 0.6.2, incluía "ssh_deletekeys: 0", deshabilitando la eliminación de cloud-init de... • https://bugs.launchpad.net/cloud-init/+bug/1781094 • CWE-321: Use of Hard-coded Cryptographic Key •