// For flags

CVE-2021-3034

Cortex XSOAR: Secrets for SAML single sign-on (SSO) integration may be logged in system logs

Severity Score

5.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An information exposure through log file vulnerability exists in Cortex XSOAR software where the secrets configured for the SAML single sign-on (SSO) integration can be logged to the '/var/log/demisto/' server logs when testing the integration during setup. This logged information includes the private key and identity provider certificate used to configure the SAML SSO integration. This issue impacts: Cortex XSOAR 5.5.0 builds earlier than 98622; Cortex XSOAR 6.0.1 builds earlier than 830029; Cortex XSOAR 6.0.2 builds earlier than 98623; Cortex XSOAR 6.1.0 builds earlier than 848144.

Se presenta una exposición de la información por medio de la vulnerabilidad del archivo de registro en el software Cortex XSOAR donde los secretos configurados para la integración de inicio de sesión único (SSO) SAML pueden ser registrados en los registros del servidor "/var/log/demisto/" al probar la integración durante la instalación. Esta información registrada incluye la clave privada y el certificado del proveedor de identidad utilizado para configurar la integración SAML SSO. Este problema afecta a: Cortex XSOAR versiones 5.5.0 builds anteriores a 98622; Cortex XSOAR versiones 6.0.1 builds anteriores a 830029; Cortex XSOAR versiones 6.0.2 builds anteriores a 98623; Cortex XSOAR versiones 6.1.0 builds anteriores a 848144

*Credits: Palo Alto Networks thanks Martin Spielmann and Stefan Lubienetzki for discovering and reporting this issue.
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-01-06 CVE Reserved
  • 2021-03-10 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-532: Insertion of Sensitive Information into Log File
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xsoar
Search vendor "Paloaltonetworks" for product "Cortex Xsoar"
5.5.0
Search vendor "Paloaltonetworks" for product "Cortex Xsoar" and version "5.5.0"
-
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xsoar
Search vendor "Paloaltonetworks" for product "Cortex Xsoar"
5.5.0
Search vendor "Paloaltonetworks" for product "Cortex Xsoar" and version "5.5.0"
70066
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xsoar
Search vendor "Paloaltonetworks" for product "Cortex Xsoar"
5.5.0
Search vendor "Paloaltonetworks" for product "Cortex Xsoar" and version "5.5.0"
73387
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xsoar
Search vendor "Paloaltonetworks" for product "Cortex Xsoar"
5.5.0
Search vendor "Paloaltonetworks" for product "Cortex Xsoar" and version "5.5.0"
75211
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xsoar
Search vendor "Paloaltonetworks" for product "Cortex Xsoar"
5.5.0
Search vendor "Paloaltonetworks" for product "Cortex Xsoar" and version "5.5.0"
78518
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xsoar
Search vendor "Paloaltonetworks" for product "Cortex Xsoar"
5.5.0
Search vendor "Paloaltonetworks" for product "Cortex Xsoar" and version "5.5.0"
94592
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xsoar
Search vendor "Paloaltonetworks" for product "Cortex Xsoar"
6.0.1
Search vendor "Paloaltonetworks" for product "Cortex Xsoar" and version "6.0.1"
-
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xsoar
Search vendor "Paloaltonetworks" for product "Cortex Xsoar"
6.0.1
Search vendor "Paloaltonetworks" for product "Cortex Xsoar" and version "6.0.1"
81077
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xsoar
Search vendor "Paloaltonetworks" for product "Cortex Xsoar"
6.0.2
Search vendor "Paloaltonetworks" for product "Cortex Xsoar" and version "6.0.2"
-
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xsoar
Search vendor "Paloaltonetworks" for product "Cortex Xsoar"
6.0.2
Search vendor "Paloaltonetworks" for product "Cortex Xsoar" and version "6.0.2"
90947
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xsoar
Search vendor "Paloaltonetworks" for product "Cortex Xsoar"
6.0.2
Search vendor "Paloaltonetworks" for product "Cortex Xsoar" and version "6.0.2"
93351
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xsoar
Search vendor "Paloaltonetworks" for product "Cortex Xsoar"
6.0.2
Search vendor "Paloaltonetworks" for product "Cortex Xsoar" and version "6.0.2"
94597
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xsoar
Search vendor "Paloaltonetworks" for product "Cortex Xsoar"
6.0.2
Search vendor "Paloaltonetworks" for product "Cortex Xsoar" and version "6.0.2"
97682
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xsoar
Search vendor "Paloaltonetworks" for product "Cortex Xsoar"
6.1.0
Search vendor "Paloaltonetworks" for product "Cortex Xsoar" and version "6.1.0"
-
Affected